7.5. Installing a KRA server with keys and certificates stored on an HSM
To enable vaults in RHEL Identity Management (IdM), install the Key Recovery Authority (KRA) Certificate System (CS) component on a specific IdM server.
Prerequisites
- The token password.
Procedure
Run the install command, ensuring you specify the token name and the token password:
# ipa-kra-install -p <password>- Specify the token password when prompted.
Verification
Verify that the keys and certificates are stored on the HSM:
certutil -L -d /etc/pki/pki-tomcat/alias - h <HSM-TOKEN> Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Enter Password or Pin for "<HSM-TOKEN>": <HSM-TOKEN>:subsystemCert cert-pki-ca u,u,u <HSM-TOKEN>:ocspSigningCert cert-pki-ca u,u,u <HSM-TOKEN>:caSigningCert cert-pki-ca CTu,Cu,Cu <HSM-TOKEN>:auditSigningCert cert-pki-ca u,u,Pu <HSM-TOKEN>:storageCert cert-pki-kra u,u,u <HSM-TOKEN>:transportCert cert-pki-kra u,u,u <HSM-TOKEN>:auditSigningCert cert-pki-kra u,u,PuThe certificate name is prefixed with the HSM token name, which indicates that the private keys and certificates are stored on the token.
Where the keys are stored does not affect how users obtain or use certificates.