Cryptoki Configuration

A number of steps must be taken in order for applications to operate correctly with SafeNet ProtectToolkit-C. The SafeNet ProtectToolkit-C environment can be extensively configured in order to allow for the wide range of security requirements that various applications may have. It is important therefore that these requirements be known when configuring SafeNet ProtectToolkit so that the most suitable security settings and functionality for the particular applications can be chosen.

This chapter begins with an introduction to the application and security model used by SafeNet ProtectToolkit-C. The chapter then covers the steps required to configure a system utilizing SafeNet ProtectToolkit-C for the first time. The concepts of Trust Management and Token Replication are discussed and illustrated with examples. Finally, the Work Load Distribution Model is explained and a configuration example is provided.

This chapter contains the following sections:

>The SafeNet ProtectToolkit-C Model

>Initial Configuration

>Work Load Distribution Model and High Availability

>External Key Storage

>Real Time Clock