Operational Tasks
This chapter describes some of the most common operational procedures a User, Administrator or Security Officer may perform during normal ProtectToolkit-C operation.
Before attempting any of the procedures in this chapter, ensure that ProtectToolkit-C has been installed and configured for normal runtime use. You can find more information about the frequently-referenced command line utilities in Command Line Utilities Reference. Many of these functions can also be achieved with the GUI-based tools, which are described in Key Management Utility (KMU) Reference and Administration Utility (gCTAdmin) Reference.
This chapter contains the following sections:
>Changing a User or Security Officer PIN
>Secure Key Backup and Restoration
>Multifactor Authentication (One-Time Password)
>Connecting and Removing Smart Card Readers
>Using Transport Mode to Avoid a Board Removal Tamper
>Changing Secure Messaging Mode
>Managing Session Key Rollover
>Tampering or Decommissioning the HSM
>RMA and Shipping Back to Thales