You are here: Appendix > Crypto Officer and Crypto User > CryptoOfficer CryptoUser

Crypto Officer & Crypto User

 

An available security layer is required in some security and authentication schemes, as follows:

For those who need the additional distinction, the Partition Owner role (black PED Key) can optionally be subdivided into two further roles:

 - Crypto Officer
 - Crypto User

In the past, and continuing, the separation of roles on the Luna HSM follows the standard Cryptoki model:

That authentication model continues unaffected, for those who prefer it. However an optional, enhanced European Cryptoki model is also available:

Either model can be used. If you work in an environment that mandates the Crypto Officer / Crypto User distinction, it is available. If you have no need of the additional password, or if you have legacy applications that use the standard Cryptoki roles, then simply do not activate the Crypto Officer / Crypto User roles.

How the Roles are Invoked

By default, the Crypto User role does not exist, and so the black PED Key owner is HSM Partition Owner. You create a Crypto User (the restricted Client user) with the "partition createUser" command.

Bad Login Attempts

By default, both the Crypto Officer and the Crypto user can make 10 consecutive failed login attempts before invoking consequences. That is, the two bad-authentication counters are independent of each other.

Submissions of incorrect Partition Passwords (or Crypto Officer and Crypto User Passwords) are not counted as incorrect black PED Key attempts.

Please note that the Luna SA must actually receive some information before it logs a failed attempt, so if you merely forget to insert a PED Key, or provide a wrong-color key, that is not logged as a failed attempt. When you successfully login, the counter is reset to zero.

See also "Cryptoki Roles Diagram".