Este conteúdo não está disponível no idioma selecionado.
Chapter 4. Supported platforms
This section describes the different server platforms, hardware, tokens, and software supported by Red Hat Certificate System 10.
4.1. General requirements Copiar o linkLink copiado para a área de transferência!
The minimal and recommended hardware for Red Hat Certificate System 10 are as follows:
Minimal requirements
- CPU: 2 threads
- RAM: 2 GB
- Disk space: 20 GB
The minimal requirements are based on the Red Hat Enterprise Linux 8 minimal requirements. For more information, see Red Hat Enterprise Linux technology capabilities and limits.
Recommended requirements
- CPU: 4 or more threads, AES-NI support
- RAM: 8 GB or more
- Disk space: 80 GB or more
4.2. Server support Copiar o linkLink copiado para a área de transferência!
See Chapter 6, Prerequisites for installation for supported system information.
4.3. Supported web browsers Copiar o linkLink copiado para a área de transferência!
The only fully-tested browser is Mozilla Firefox, and to some extent, Chrome. However, in general, newer versions of browsers on major OS platforms are likely to work.
4.4. Supported Hardware Security Modules Copiar o linkLink copiado para a área de transferência!
The following table lists Hardware Security Modules (HSM) supported by Red Hat Certificate System:
HSM | Firmware | Appliance Software | Client Software |
---|---|---|---|
nCipher nShield Connect XC | nShield_HSM_Firmware-12.72.1 | 12.71.0 | SecWorld_Lin64-12.71.0 |
Thales TCT Luna Network HSM T-5000 with Luna-T7 internal card | lunafw_update-7.11.1-4 | 7.11.0-25 | LunaClient-7.11.1-5 |
While the Common Criteria evaluation tested using this Entrust HSM, any HSM is considered equivalent when it is at least FIPS 140-2 validated, provides PKCS#11 3.0 cryptographic services or higher, hardware protection for keys and supports the required algorithms. Some tokens that do not follow the PKCS #11 3.0 semantics will fail. For instance, some tokens do not properly support CKA_ID, which is a requirement for RHCS certificate and key provisioning of the token.
Limited support for Thales Luna: Red Hat was not able to confirm that the Thales HSM unit supports AES key wrapping/unwrapping via OAEP. Please be aware that those features requiring support of this algorithm will not function without such support. These features include:
- KRA: key archival and recovery
- CMC SharedToken authentication mechanism for enrollments
-
TKS
TPS shared secret automatic transport during installation
It is, however, observed that workarounds may be employed for some of these features, but at the cost of degraded security level or operational inconvenience.
Another example is that a certain Safenet Luna model supports PKI private key extraction in its CKE - Key Export model, and only in non-FIPS mode. The Luna Cloning model and the CKE model in FIPS mode do not support PKI private key extraction.