Software installation
See the appropriate Installation Guide for your nShield module for more about installing the Security World software.
After you have installed the software, you must complete further Security World creation, configuration and setup tasks before you can use your nShield environment to protect and manage your keys.
After software installation
After you have successfully installed the Security World Software, as described in the Installation Guide), complete the following steps to finish preparing your HSM for use:
-
Ensure that your public firewall is set up correctly. See the Installation Guide for your HSM for more information about firewall settings.
-
If the SSH keys have not been set up, create the communication path between the host machine and the HSM, as described in Set up communication between host and module.
If you followed the steps in the Installation Guide when installing the software, this should already be set up. -
If necessary, perform additional software and HSM configuration tasks, as described in Client software and module configuration:
-
Set up client configuration, as described in Setting up client cooperation
-
Set nShield specific environment variables, as described in Setting environment variables
-
Configure logging and debugging parameters, as described in Logging and debugging
-
Configure Audit Logging, as described in Configuring audit logging
-
Configure Java support for KeySafe, as described in Configuring Java support for KeySafe
-
Configure the hardserver, as described in Configuring the hardserver
-
-
Create and configure a Security World, as described in Creating a Security World.
-
Create an OCS, as described in Creating Operator Card Sets (OCSs).