Getting started
Refer to the sections below to get started with the integration.
Supported configurations
Thales has tested integration with Microsoft OCSP using the configurations listed in the table below.
Operating system | PTK version | PS3 HSM hardware | PS3 HSM firmware |
---|---|---|---|
Windows Server 2019 | 7.1.0 | PCIe3, PSE3, PSE3+ | 7.01.00 |
Note
This integration is tested with ProtectServer 3 HSMs in FIPS Mode.
Setting up your environment for the integration
Before beginning the integration, you must set up your environment for the integration.
To set up your environment for the integration
-
Install one of the supported operating systems on the client machine. Refer to Supported configurations for more information.
-
Set up, initialize, provision, and prepare a ProtectServer 3 HSM for deployment. Refer to ProtectServer 3 HSM and ProtectToolkit 7 installation and configuration for more information.
-
Install the ProtectToolkit-C Runtime and CNG Provider packages on the client machine. Refer to ProtectToolkit 7 software installation and Setup and configuration for more information about installing ProtectToolkit and configuring ProtectToolkit-M, respectively.
Note
If you are operating the ProtectServer 3 HSM in FIPS Mode for this integration, ensure that client system is configured to communicate with the HSM over the Secure Messaging System (SMS). For more information, refer to Using ProtectToolkit-M with the Secure Messaging System enabled.
-
Configure the ProtectServer 3 HSM for the integration.
-
Create a slot on the HSM that will be used by MS OCSP. Refer to Adding and removing slots for more information.
-
Verify that the the HSM is successfully configured by running hsmstate.
C:\Users\Administrator>hsmstate HSM device 0: HSM in NORMAL MODE. RESPONDING. Usage Level=0% C:\Users\Administrator>ctkmu l ProtectToolkit C Key Management Utility 7.0.0 Copyright (c) Safenet, Inc. 2009-2021 Cryptoki Version = 2.20 Manufacturer = Safenet, Inc. Test (Slot 0) AdminToken (524128) (Slot 1) C:\Users\Administrator>
-
-
Set up Microsoft's Online Certificate Status Protocol (OCSP). Refer to Setting up Microsoft OCSP for complete procedure.
-
Configure the SafeNet Key Storage Provider (KSP). Refer to Configuring the SafeNet KSP for more information.
Setting up Microsoft OCSP
Note
All machines in the OCSP setup require Domain Administrator privileges.
Microsoft OCSP must be installed on the target machine using the following setup:
-
Windows Server machine that will be used as a domain controller.
-
Windows Server machine that will be used as CA and OCSP Server.
-
Windows machine, which will become a client to submit enrolment requests to the CA.
The three machines utilized are denoted in the setup as follows:
-
OCSPDC: Windows Server Domain Controller machine.
-
OCSPSERV: Windows Server CA and OCSP Server machine.
-
OCSPCL: Windows Server client machine.
You can install Microsoft OCSP and CA on separate machines. If you are configuring your OCSP on separate machines, the following setup is recommended:
-
OCSPCA: Windows Server machine, which will become a domain controller and CA.
-
OCSPSERV: Windows Server machine, which will become an OCSP Server.
-
OCSPCL: Windows machine, which will become a client to submit enrolment requests to the CA.
Configuring the SafeNet KSP
Note
If you are configuring Microsoft OCSP on multiple systems, the SafeNet KSP must be configured on the Certificate Authority and OCSP server systems.
To configure the SafeNet KSP
-
Navigate to the KSP installation directory.
-
Run the KSP configuration wizard (KspConfig.exe).
-
Double-click Register Or View Security Library.
-
Browse the library cryptoki.dll from the SafeNet ProtectServer 3 HSM Client installation directory Register.
On successful registration, the following message appears:
-
Double-click Register HSM Slots on the left side of the pane.
-
Register the slot for the Administrator as follows:
-
Open the Register for User drop-down menu and select ADMINISTRATOR.
-
Open the Domain drop-down menu and select your domain.
-
Open the Available Slots drop-down menu and select the relevant service.
-
Enter the Slot Password.
-
Select Register Slot.
On successful registration, the following message appears:
-
-
Register the same slot for NT AUTHORITY\SYSTEM.