Home >

Administration Guide > PED (Trusted Path) Authentication > Compare Password and PED Authentication

Compare Password and PED Authentication

  Password-authenticated HSM PED-authenticated HSM
Ability to restrict access to cryptographic keys

knowledge of Partition Password is sufficient  

for backup/restore, knowledge of partition domain password is sufficient

ownership of the black PED Key is mandatory  

for backup/restore, ownership of both black and red PED Keys is necessary  

the Crypto User role is available to restrict access to usage of keys, with no key management

option to associate a PED PIN (something-you-know) with any PED Key (something you have), imposing a two-factor authentication requirement on any role

Dual Control

not available  

Mof N (split-knowledge secret sharing) requires "M" different holders of portions of the role secret, in order to authenticate to an HSM role - can be applied to any, all, or none of the administrative and management operations required on the HSM

Key-custodian responsibility

linked to password knowledge, only  

linked to partition password knowledge,  

linked to black PED Key(s) ownership

Role-based Access Control (RBAC) - ability to confer the least privileges necessary to perform a role

roles limited to:

Auditor  

HSM Admin (SO)

Partition Owner

available roles:  

Auditor  

HSM Admin (Security Officer)

Domain (Cloning / Token-Backup)

Secure Recovery

Remote PED

Partition Owner (or Crypto Officer)

Crypto User (usage of keys only, no key management)

for all roles, two-factor authentication (selectable option) and MofN (selectable option)

Two-factor authentication for remote access

not available  

Remote PED and orange (Remote PED Vector) PED Key deliver highly secure remote management of HSM, including remote backup