Home > |
Configuration Guide > About the Configuration Guide
|
---|
This document describes how to configure your HSM to get it ready to operate in your environment. It contains the following chapters:
•Configuring a Password-Authenticated HSM
•Configuring a PED-Authenticated HSM
This preface also includes the following information about this document:
For information regarding the document status and revision history, see Document Information.