Home >

HSM Administration Guide > Partitions > Separation of HSM Workspaces

Separation of HSM Workspaces

Depending on the SafeNet Luna HSM and its configuration, the HSM can have three, or more, logical partitions.

One for the Security Officer (SO)

One for the Auditor

One (or more) for applications and Clients

In rare circumstances, the Security Officer might create and keep cryptographic objects, Normally it is not used for "production" cryptographic operations - the SO space is intended for overall HSM-level administration.

The Auditor partition is used to enable and manage secure audit logging activities, and generally has no other function in the HSM.

Application Partitions

An initialized partition has its own SO. The Partition SO manages what happens inside the partition. The HSM SO creates the partition, and deletes it when necessary, but has no other oversight or control of the partition. This distinction is particularly important in cloud scenarios, but is a significant element in separation of roles for any use of an HSM.

Operation

Crypto operations are normally performed from a logged-in session on the HSM. It is possible to create objects without logging in, so long as the CKA_PRIVATE attribute is set to 0 - that is, public objects. You can also delete any object that has CKA_PRIVATE=0. This is as defined in PKCS#11, and is not a security issue.

The restrictions that you expect come into play for objects that are created with CKA_PRIVATE=1, where only the owner is able to delete (or the SO could delete the entire partition containing the objects).

These distinctions can be demonstrated with CKDemo commands 1) Open Session, and 3) Login.

The "Open Session" prompt has three options, to choose the partition that you wish to use:

1.Enter your choice (99 or 'FULL' for full help): 1

SO[0], normal user[1], or audit user[2]?

If you select "normal user [1]", when opening a session, you are telling the library that you choose to use the user partition which is owned by the partition User (or is shared by the Crypto-Officer and Crypto-User if the partition User has been separated into those two sub-entities).

The session is started, but you have not yet authenticated, and so cannot perform most operations in the session.

The Login prompt has four options, to perform the needed authentication (log into the session that you started above):

1.Enter your choice (99 or 'FULL' for full help): 3

Security Officer[0]

Crypto-Officer [1]

Crypto-User [2]:

Audit-User [3]:

2.Enter PIN :

If you have chosen the "normal user [1]" partition, when opening the session, then the valid login authentication options are:

Crypto-Officer (which is the same as partition User (the black PED key for PED-authenticated HSMs) if the Crypto-Officer/Crypto-User distinction is not in force) or

Crypto User (which is the limited user when the Crypto-Officer/Crypto-User distinction has been invoked).

If you attempt one of the other two authentications, "Security Officer [0]" or "Audit-User [3]", an error message is returned because those are not applicable to the session type (therefore, the partition type) that you selected earlier.

If certificates are created as private objects (CKA_PRIVATE=1), the Crypto User cannot delete them. Also, the Crypto User cannot create fake private objects with CKA_PRIVATE=1. The Crypto User limitations are focused on restricting access to sensitive and/or private keys and objects.

Key Management Commands

LUNA_CREATE_OBJECT:

LUNA_COPY_OBJECT:

LUNA_DESTROY_OBJECT:

LUNA_MODIFY_OBJECT:

LUNA_DESTROY_MULTIPLE_OBJECTS:

LUNA_GENERATE_KEY:

LUNA_GENERATE_KEY_W_VALUE:

LUNA_GENERATE_KEY_PAIR:

LUNA_WRAP_KEY:

LUNA_UNWRAP_KEY:

LUNA_UNWRAP_KEY_W_VALUE:

LUNA_DERIVE_KEY:

LUNA_DERIVE_KEY_W_VALUE:

LUNA_MODIFY_USAGE_COUNT:

Normal Usage Commands

LUNA_ENCRYPT_INIT:

LUNA_ENCRYPT:

LUNA_ENCRYPT_END:

LUNA_ENCRYPT_SINGLEPART:

LUNA_DECRYPT_INIT:

LUNA_DECRYPT:

LUNA_DECRYPT_END:

LUNA_DECRYPT_RAW_RSA:

LUNA_DECRYPT_SINGLEPART:

LUNA_DIGEST_INIT:

LUNA_DIGEST:

LUNA_DIGEST_KEY:

LUNA_DIGEST_END:

LUNA_SIGN_INIT:

LUNA_SIGN:

LUNA_SIGN_END:

LUNA_SIGN_SINGLEPART:

LUNA_VERIFY_INIT:

LUNA_VERIFY:

LUNA_VERIFY_END:

LUNA_VERIFY_SINGLEPART:

LUNA_GET_OBJECT_SIZE:

LUNA_SEED_RANDOM:

Unauthenticated Commands

LUNA_GET:

LUNA_GET_CONTAINER_LIST:

LUNA_GET_CONTAINER_NAME:

LUNA_LOGIN:

LUNA_OPEN_SESSION:

LUNA_PARTITION_SERNUM_GET:

LUNA_FIND_OBJECTS:

LUNA_GET_RANDOM:

LUNA_OPEN_ACCESS:

LUNA_GET_MECH_LIST:

LUNA_GET_MECH_INFO:

LUNA_SELF_TEST:

LUNA_GET_HSM_CAPABILITY_SET:

LUNA_GET_HSM_POLICY_SET:

LUNA_GET_CONTAINER_CAPABILITY_SET:

LUNA_GET_CONTAINER_POLICY_SET:

LUNA_GET_CONFIGURATION_ELEMENT_DESCRIPTION:

LUNA_RETRIEVE_LICENSE_LIST:

LUNA_QUERY_LICENSE:

LUNA_GET_CONTAINER_STATUS:

LUNA_GET_OUID:

LUNA_GET_CONTAINER_STORAGE_INFO:

LUNA_GET_ATTRIBUTE_VALUE:

LUNA_GET_ATTRIBUTE_SIZE:

LUNA_GET_HANDLE:

LUNA_INIT_TOKEN:

LUNA_PARTITION_INIT:

LUNA_CLOSE_ACCESS:

LUNA_DEACTIVATE:

LUNA_MTK_GET_STATE:

LUNA_MTK_RESPLIT:

LUNA_MTK_RESTORE:

LUNA_MTK_UNLOCK_CHALLENGE:

LUNA_MTK_UNLOCK_RESPONSE:

LUNA_MTK_ZEROIZE:

LUNA_CLEAN_ACCESS:

LUNA_PED_GET_SET_RAW_DATA:

LUNA_ZEROIZE:

LUNA_FACTORY_RESET:

LUNA_HA_LOGIN:

LUNA_CONFIGURE_SP:

LUNA_LOG_POLL_HOST:

LUNA_LOG_EXTERNAL:

LUNA_ROLE_STATE_GET:

Commands That are Valid Only in a Session, But Require Special Handling

LUNA_LOGOUT:

LUNA_CLOSE_ALL_SESSIONS:

LUNA_CLOSE_SESSION:

LUNA_GET_SESSION_INFO: