此内容没有您所选择的语言版本。
Chapter 8. Using Hardware Security Modules for Subsystem Security Databases
A subsystem instance generates and stores its key information in a key store, called a security module or a token. A subsystem instance can be configured for the keys to be generated and stored using the internal NSS token or on a separate cryptographic device, a hardware token.
8.1. Installing Certificate System with an HSM 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Use the following parameters in the configuration file you pass to the
pkispawn
utility when installing Certificate System with an HSM: