The first step is creating an HSM partition, which can be thought of as an independent logical HSM within your IBM Cloud HSM device.
Next, the partition needs to be assigned to the client, in this case your key server.
After the partition has been assigned, run lunacm from your virtual server and initialize the partition.
2. Generate RSA and ECDSA key pairs and certificate signing requests (CSRs)
Before running the commands below, check with your information security and/or cryptography team to confirm the approved key creation procedures for your organization.
When you perform this operation, you need define the ID field for the newly generated keys. It must be set to a big-endian hexadecimal integer value.
Using the keys created in the previous step, generate CSRs that can be sent to a publicly trusted Certificate Authority (CA) for signing.
3. Obtain and upload signed certificates from your Certificate Authority (CA)
Provide the CSRs created in the previous step to your organization's preferred CA, demonstrate control of your domain as requested, and then download the signed SSL certificates. Follow the instructions provided in Upload Keyless SSL Certificates.
4. Modify your gokeyless config file and restart the service
Lastly, we need to modify the configuration file that the key server will read on startup. Change the object=mykey and pin-value=username:password values to match the key label you provided and CU user you created.
Open /etc/keyless/gokeyless.yaml and immediately after:
add:
With the config file saved, restart gokeyless and verify it started successfully.
Was this helpful?
What did you like?
What went wrong?
Thank you for helping improve Cloudflare's documentation!