Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 4. Supported platforms


This section describes the different server platforms, hardware, tokens, and software supported by Red Hat Certificate System 10.

4.1. General requirements

The minimal and recommended hardware for Red Hat Certificate System 10 are as follows:

Minimal requirements

  • CPU: 2 threads
  • RAM: 2 GB
  • Disk space: 20 GB

The minimal requirements are based on the Red Hat Enterprise Linux 8 minimal requirements. For more information, see Red Hat Enterprise Linux technology capabilities and limits.

Recommended requirements

  • CPU: 4 or more threads, AES-NI support
  • RAM: 8 GB or more
  • Disk space: 80 GB or more

4.2. Server support

See Chapter 6, Prerequisites for installation for supported system information.

4.3. Supported web browsers

The only fully-tested browser is Mozilla Firefox, and to some extent, Chrome. However, in general, newer versions of browsers on major OS platforms are likely to work.

4.4. Supported Hardware Security Modules

The following table lists Hardware Security Modules (HSM) supported by Red Hat Certificate System:

Expand
HSMFirmwareAppliance SoftwareClient Software

nCipher nShield Connect XC

nShield_HSM_Firmware-12.72.1

12.71.0

SecWorld_Lin64-12.71.0

Thales TCT Luna Network HSM T-5000 with Luna-T7 internal card

lunafw_update-7.11.1-4

7.11.0-25

LunaClient-7.11.1-5

Note

While the Common Criteria evaluation tested using this Entrust HSM, any HSM is considered equivalent when it is at least FIPS 140-2 validated, provides PKCS#11 3.0 cryptographic services or higher, hardware protection for keys and supports the required algorithms. Some tokens that do not follow the PKCS #11 3.0 semantics will fail. For instance, some tokens do not properly support CKA_ID, which is a requirement for RHCS certificate and key provisioning of the token.

NOTE

Limited support for Thales Luna: Red Hat was not able to confirm that the Thales HSM unit supports AES key wrapping/unwrapping via OAEP. Please be aware that those features requiring support of this algorithm will not function without such support. These features include:

  • KRA: key archival and recovery
  • CMC SharedToken authentication mechanism for enrollments
  • TKS TPS shared secret automatic transport during installation

It is, however, observed that workarounds may be employed for some of these features, but at the cost of degraded security level or operational inconvenience.

Another example is that a certain Safenet Luna model supports PKI private key extraction in its CKE - Key Export model, and only in non-FIPS mode. The Luna Cloning model and the CKE model in FIPS mode do not support PKI private key extraction.

Retour au début
Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2025 Red Hat