Planning Your Configuration

Before initializing your HSM, consider the following available features and options. Some would be inconvenient to change after your HSM is in service:

>Appliance Roles and Procedures

>HSM Roles and Procedures

>Domain Planning

>Password-authenticated HSM Planning

>PED-authenticated HSM Planning

>Recommended Network Characteristics

>IPv6 Support and Limitations

NOTE   If you intend to enable HSM Audit logging for your HSM, then see Audit Logging Overview and consider enabling logging before any other HSM activity, to ensure that all HSM actions (initialization, role creation, etc.) are logged. When deciding, be aware that HSM Audit Logging does incur a performance overhead.