Integrating with an HSM
For guidance on integrating the Entrust Key and Secrets Management with a Hardware Security Module (HSM), consult with your HSM vendor. If you are using an Entrust nShield HSM, refer to the Entrust KeyControl nShield HSM Integration Guide for instructions on how to configure Entrust Key and Secrets Management with FIPS 140-3 or FIPS 140-2 certified protection.