Creating an Application Partition on the HSM
In a previous chapter, you initialized the HSM, establishing ownership and administrative oversight by the HSM Security Officer, using the authentication method that is supported by your HSM (password-authenticated or PED-authenticated). In this chapter, you establish a separate space in the HSM for use by your cryptographic applications - for creation, storage, and use of cryptographic keys and objects.
The set of instructions that apply to your HSM and application partition depends on the type of authentication used by your HSM, and therefore by any application partitions (which was decided when you purchased the HSM), as follows: