Ce contenu n'est pas disponible dans la langue sélectionnée.
Chapter 8. Using Hardware Security Modules for Subsystem Security Databases
A subsystem instance generates and stores its key information in a key store, called a security module or a token. A subsystem instance can be configured for the keys to be generated and stored using the internal NSS token or on a separate cryptographic device, a hardware token.
8.1. Installing Certificate System with an HSM Copier lienLien copié sur presse-papiers!
Copier lienLien copié sur presse-papiers!
Use the following parameters in the configuration file you pass to the
pkispawn utility when installing Certificate System with an HSM: