Este conteúdo não está disponível no idioma selecionado.

Chapter 4. Supported platforms


This section describes the different server platforms, hardware, tokens, and software supported by Red Hat Certificate System 10.

4.1. General requirements

The minimal and recommended hardware for Red Hat Certificate System 10 are as follows:

Minimal requirements

  • CPU: 2 threads
  • RAM: 2 GB
  • Disk space: 20 GB

The minimal requirements are based on the Red Hat Enterprise Linux 8 minimal requirements. For more information, see Red Hat Enterprise Linux technology capabilities and limits.

Recommended requirements

  • CPU: 4 or more threads, AES-NI support
  • RAM: 8 GB or more
  • Disk space: 80 GB or more

4.2. Server support

See Chapter 6, Prerequisites for installation for supported system information.

4.3. Supported web browsers

The only fully-tested browser is Mozilla Firefox, and to some extent, Chrome. However, in general, newer versions of browsers on major OS platforms are likely to work.

4.4. Supported Hardware Security Modules

The following table lists Hardware Security Modules (HSM) supported by Red Hat Certificate System:

Expand
HSMFirmwareAppliance SoftwareClient Software

nCipher nShield Connect XC

nShield_HSM_Firmware-12.72.1

12.71.0

SecWorld_Lin64-12.71.0

Thales TCT Luna Network HSM T-5000 with Luna-T7 internal card

lunafw_update-7.11.1-4

7.11.0-25

LunaClient-7.11.1-5

Note

While the Common Criteria evaluation tested using this Entrust HSM, any HSM is considered equivalent when it is at least FIPS 140-2 validated, provides PKCS#11 3.0 cryptographic services or higher, hardware protection for keys and supports the required algorithms. Some tokens that do not follow the PKCS #11 3.0 semantics will fail. For instance, some tokens do not properly support CKA_ID, which is a requirement for RHCS certificate and key provisioning of the token.

NOTE

Limited support for Thales Luna: Red Hat was not able to confirm that the Thales HSM unit supports AES key wrapping/unwrapping via OAEP. Please be aware that those features requiring support of this algorithm will not function without such support. These features include:

  • KRA: key archival and recovery
  • CMC SharedToken authentication mechanism for enrollments
  • TKS TPS shared secret automatic transport during installation

It is, however, observed that workarounds may be employed for some of these features, but at the cost of degraded security level or operational inconvenience.

Another example is that a certain Safenet Luna model supports PKI private key extraction in its CKE - Key Export model, and only in non-FIPS mode. The Luna Cloning model and the CKE model in FIPS mode do not support PKI private key extraction.

Voltar ao topo
Red Hat logoGithubredditYoutubeTwitter

Aprender

Experimente, compre e venda

Comunidades

Sobre a documentação da Red Hat

Ajudamos os usuários da Red Hat a inovar e atingir seus objetivos com nossos produtos e serviços com conteúdo em que podem confiar. Explore nossas atualizações recentes.

Tornando o open source mais inclusivo

A Red Hat está comprometida em substituir a linguagem problemática em nosso código, documentação e propriedades da web. Para mais detalhes veja o Blog da Red Hat.

Sobre a Red Hat

Fornecemos soluções robustas que facilitam o trabalho das empresas em plataformas e ambientes, desde o data center principal até a borda da rede.

Theme

© 2025 Red Hat