![]() |
![]() |
||||||||||||||||||||||||
Enabling cryptographic hardware for the Secure Sockets Layer |
|||||||||||||||||||||||||
![]() ![]() ![]() |
This section provides information on enabling cryptographic hardware for the Secure Sockets Layer (SSL). Links to related topics appear at the end of this section. |
Managing cryptographic keys and storing them on cryptographic hardware provides a highly secure architecture for secure online transactions. This capability greatly increases performance and security in a Web server using SSL.
The following cryptographic devices have been tested with IBM HTTP Server:
|
|||||||||||||||||||||||
![]() |
Support for the following adapters has been tested with later WebSphere Application Server releases: |
||||||||||||||||||||||||
Use the Rainbow Cryptoswift, IBM e-business Cryptographic Accelerator, nCipher nFast Accelerator and nCipher nForce Accelerator, for public key operations, and RSA key decryption. These devices store keys on your hard drive. Accelerator devices speed up the public key cryptographic functions of SSL, freeing up your server processor, which increases server throughput and shortens wait time. The Rainbow Cryptoswift, IBM e-business Cryptographic Accelerator, and nCipher accelerators incorporate faster performance and more concurrent secure transactions. The PKCS#11 protocol either stores RSA keys on cryptographic hardware, or encrypts keys using cryptographic hardware to ensure protection. The nCipher nForce Accelerator can either perform acceleration, or it can perform both acceleration and key storage with PKCS#11 support. The IBM 4758 and nCipher nForce Accelerator with PKCS#11 support ensures inaccessible keys to the outside world. This support never reveals keys in an unencrypted form because the key is either encrypted by the hardware, or stored on the hardware. nCipher nForce Accelerator V4.0 and later using PKCS11 key storage, has a nonremovable option which can noticeably improve performance. Contact nCipher Technical Support for instructions to turn on this feature. Getting startedThe IBM 4758 requires the PKCS11 support software for the host machine and internal firmware. You also need the manual which explains software installation and card coprocessor microcode loading. The support software and manual do not come with the IBM 4758 card, but you can download them from the following Web site: http://www-3.ibm.com/security/cryptocards/index.shtml. From the download site, obtain the PKCS#11 Model 002/023 software and the PKCS#11 Installation manual. After installing the support software on your machine and loading the microcode on the IBM 4758, initialize the card. Configure the IBM HTTP Server to pass the module for the PKCS11 device, the token label, the key label of the key created by the PKCS11 device, and the user PIN password of the token to the GSKit for access to the key for the PKCS11 device by modifying the configuration file. The PKCS11 module differs for each platform and PKCS11 device. For the IBM hardware cryptographic devices - IBM 4758 card, available on AIX and Windows operating systems, and IBM e-business Cryptographic Accelerator, the PKCS11 module ships with the bos.pkcs11 package on AIX. Install the devices.pci.14109f00 device for the IBM 4758 and the devices.pci.1410e601 device for the IBM e-business Cryptographic Accelerator. AIX V4.3.3 maintenance level09 is recommended when using the IBM e-business Cryptographic Accelerator. For the IBM 4758 on Windows, the PKCS11 module comes with the PKCS11 software available for download from: http://www.ibm.com/security/cryptocards/html/ordersoftware.shtml. For nCipher, the PKCS11 module ships with nCipher software and is located in the $NFAST_HOME/toolkits/pkcs11 directory. The default locations of the PKCS11 modules for each PKCS11 device follow: |
|||||||||||||||||||||||||
![]() ![]() ![]() ![]() ![]() ![]() |
|
||||||||||||||||||||||||
![]() |
Initializing IBM cryptographic hardware (IBM 4758 and IBM e-business Cryptographic Accelerator) on the AIX operating system |
||||||||||||||||||||||||
To initialize the IBM cryptographic hardware (IBM 4758 and IBM e-business Cryptographic Accelerator) on AIX,
obtain and install the bos.pkcs11 software.
After you install the PKCS11 software, initialize your device. You can access the Manage the PKCS11 subsystem panel from Smitty to initialize your PKCS11 device. To initialize your token:
|
|||||||||||||||||||||||||
![]() ![]() |
Initializing IBM tokens on Windows operating systems |
||||||||||||||||||||||||
To initialize the IBM 4758 card on the Windows NT and Windows 2000 operating systems, obtain the PKCS11 software for these operating systems from http://www-3.ibm.com/security/cryptocards/html/ordersoftware.shtml. You can use the TOKUTIL.EXE utility that installs with the PKCS11 software to initialize your card on Windows operating systems. Refer to Chapter 5: Token Initialization from the PKCS11 for more details.
Using IKEYMAN to store keys on a PKCS11 device |
|||||||||||||||||||||||||
![]() ![]() ![]() ![]() ![]() ![]() |
To create keys for your PKCS11 device, provide an ikmuser.properties file for IKEYMAN. To provide this file: |
||||||||||||||||||||||||
As long as you have the ikmuser.properties file located in the classes directory, the device reads the ikmuser.properties file contents, whenever you bring up IKEYMAN. When IKEYMAN comes up, the IBM Key Management window has an additional menu item called cryptographic token.
Configuring the IBM HTTP Server to use nCipher and Rainbow accelerator devicesThe IBM HTTP Server enables nCipher and Rainbow accelerator devices by default. To disable your accelerator device, add the following directive to your configuration file: SSLAcceleratorDisable Configuring the IBM HTTP Server to use PKCS11 devices
If you want the IBM HTTP Server to use the PKCS11 interface, configure the following:
(Back to the top) |