EasyManua.ls Logo

Thales payShield 10K - User Manual

Thales payShield 10K
470 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
cpl.thalesgroup.com
payShield
®
10K
I
nstallation and User Guide
PUGD0535
-006

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Thales payShield 10K and is the answer not in the manual?

Summary

1 Introduction

1.1 Documentation Overview

Outlines the various manuals for the payShield 10K Hardware Security Module (HSM).

1.2 Audience

Defines the intended audience for the payShield 10K Installation and User Guide.

1.3 payShield 10 K General Description

Provides a general description of the payShield 10K HSM, its functions, and role.

1.4 Typical Configuration

1.4.1 Command Flow

Explains the data flow and processing of commands between the Host and the payShield 10K.

1.5 Smart cards

1.6 Customer Trust Authority (CTA)

Explains the Customer Trust Authority (CTA) as a public/private key pair for authenticating keys.

1.7 Keys

1.7.1 Encryption Mechanism

Describes the encryption mechanism for locally stored keys using the Local Master Key (LMK).

1.7.2 HSM Recovery Key

Details the AES HSM Recovery Key (HRK) for restoring keys after tampering.

1.7.3 Local Master Keys (LMKs)

1.7.3.1 Multiple LMKs

Discusses the support for multiple LMKs and their benefits for security and operational management.

1.7.4 Zone Master Key

1.7.5 Terminal Master Key

Describes the Terminal Master Key (TMK) for distributing data-epcryption keys to ATMs or POS terminals.

1.7.7 Terminal Encryption Key

1.7.10 Master Session Key

Details the master/session key management scheme for exchanging data-encrypting keys during a session.

1.8 Key Shares

1.9 Host Commands supporting multiple LMKs

Describes how host commands support multiple LMKs and LMK schemes through optional fields.

1.10 payShield 10 K license packages

1.11 Trusted Management Device (TMD)

Introduces the Trusted Management Device (TMD) for securely managing key components to meet PCI standards.

2 Backwards Compatibility and Differences

2.1.1 Host Interface and Commands

Lists the major differences in Host Interface and Commands between payShield 9000 and payShield 10K.

2.1.2 Options for Managing payShield 10 K

2.1.3 Modifications made to the console commands

Lists modifications made to the console commands for the payShield 10K compared to previous versions.

2.1.4 Feature Comparison

2.1.5 Front Panel

Describes the front panel of the payShield 10K, including key locks and LEDs.

2.1.8 Rear Panel

2.1.9 Enhanced Security Features

Lists the enhanced physical security features designed into the payShield 10K for default security.

2.1.10 Diagnostics

2.1.11 Monitoring

Describes changes to payShield Monitor and SNMP for enhanced monitoring capabilities.

3 Physical Description

3.1 Front panel

Details the front panel components, including key locks, smart card reader, and LEDs.

3.1.3.3 Tamper LED

3.1.3.4 Boot-up LED Sequence

Describes the LED display changes during the payShield 10K's power-up sequence.

3.1.3.5 Blue LED

3.1.4 Air Inlets

Describes the air inlets on the payShield 10K, providing cooling for the system and power supplies.

3.2 Rear panel

3.2.1 AC;DC power supplies

Explains the dual AC/DC power supply units and their features, designed for redundancy.

3.2.1.1 Swapping out the Power Supply

3.2.2 Fan trays

Describes the two redundant fan trays and their components, which can be independently removed.

3.2.4 AC Power on;off switch

3.2.5 PCIe card interface

Mentions the single PCIe interface slot available on the HSM.

3.2.6 Ethernet ports

3.2.7 USB Type A port

Describes the single USB Type A port, providing power to attached devices.

4 Installation

4.1 Pre-installation tasks

Outlines the necessary pre-installation tasks, including reading safety documents and planning clearances.

4.1.1 Mechanical and Electrical Specifications

4.1.1.1 Physical Characteristics

Details the physical characteristics of the payShield 10K, including form factor and dimensions.

4.1.1.2 Power Considerations

4.2 Installation Procedure

Details the step-by-step procedure for installing the HSM, including unpacking and rack mounting.

4.2 Installation Procedure

9.1 Introduction

Introduces the facility for migrating between Local Master Keys (LMKs) for security purposes.

5 payShield 10 K 10 G Ethernet Hardware Platform Variant

5.1 Introduction

Introduces the payShield 10K hardware platform variant that supports 10G Ethernet.

5.2 Rear Panel Overview

5.3 General Notes

Lists general notes regarding the payShield 10K 10G Ethernet Hardware Platform, including network connections and port settings.

5.4 Installing 10 Gb ports

5.5 Power Consumption

Provides information on the power consumption of the 10G Ethernet Hardware Platform variant under different port configurations.

6 payShield Management Options

6.1 Introduction to payShield Manager

Introduces payShield Manager, detailing its features for HSM configuration, installation, and maintenance.

7 Commission using payShield Manager

7.1 Introduction

Introduces the chapter on commissioning the payShield 10K using payShield Manager, covering local and remote methods.

7.2 Prerequisites

7.3 Preparing for Commissioning

Details the steps required for preparing the payShield 10K before the commissioning process begins.

7.3.5 Connect to the Network

7.4 Connecting to payShield 10 K, Installing Browser Extensions and Configuring Smart Card Reader

Guides on connecting to payShield 10K, installing browser extensions, and configuring the smart card reader.

7.4.3 Configure the Smart Card reader

7.5 Commissioning payShield 10 K

Details the steps required to complete the commissioning of the payShield 10K for LMK generation and configuration.

7.5.1 Open the Commissioning Wizard page

7.5.2 Create a new Security Domain

Explains how to create a new security domain, which is made up of HSMs and Remote Access Cards.

7.5.3 Load the Security Domain

8 Using payShield Manager

Describes the functionality provided by payShield Manager, assuming the commissioning process is complete.

8.1 Introduction to payShield Manager

8.2 Logging into payShield Manager

Provides instructions on how to log into payShield Manager using the payShield 10K's IP address.

8.3 Top Tab descriptions

8.3.1 Summary Tab

Explains the Summary Tab, which displays summary information about the HSM.

8.3.2 Status Tab

Explains the Status Tab, allowing viewing of device information and causing a reboot.

8.3.3 Operational Tab

8.3.4 Domain Tab

Describes the Domain Tab, used for viewing and managing the payShield Security Group's Smart Card whitelist and Security Domain.

8.4 Virtual Console Tab

8.5 Lower screen icons

Describes the icons displayed at the bottom of the screen, providing status and state information.

8.5.1 payShield 10 K States

8.5.1.1 Online

Explains the Online state, where the HSM permits communication with a Host computer system.

8.5.1.2 Offline

8.5.1.3 Secure

Explains the Secure state, required for highly sensitive functions like generating or loading LMKs.

8.5.1.4 Switching to Online or Offline State

8.5.1.5 Switching to Secure State

Details the process of switching the HSM to its Secure state, requiring authentication of specific RACC cards.

8.5.2 Time Remaining

8.5.3 Information

Displays information about the HSM, including serial number, firmware version, and PSU status.

8.5.4 User

8.5.5 Status

Displays the number of error and audit log entries, system uptime, and number of LMKs installed.

8.5.6 Smart Card Operations

8.5.7 Login;Logout of Users

Details how to log in additional users and how to log out logged-in users.

8.6 Summary Page

8.6.1 Summary Dashboard

Displays a table with HSM details like Model Number, Serial Number, Software Version, and LMK status.

8.6.2 Health Dashboard

8.6.2.1 How to resolve reported errors

Provides steps to resolve reported errors, using the Status > Maintenance navigation.

8.6.3 Configuration Dashboard

8.6.4 Local Master Key

Shows the Local Master Key Table and Key Change Storage Table, providing an overview of LMK status.

8.7 Status page

8.7.1 Device Information

Displays system name, unit description, serial number, model, performance, and manufacturing date.

8.7.2 Utilization Statistics

8.7.3 Health Statistics;Diagnostics

Allows enabling/disabling health statistics collection and resetting gathered statistics.

8.7.3.1 Health;Stats

8.7.3.2 Diagnostics

Lists tests that can be run periodically or immediately to diagnose HSM components.

8.7.3.3 Maintenance

8.7.4 Error Log

Describes the Error Log, which stores fault information for support personnel.

8.7.5 Audit Log

8.7.5.1 Audit - General

Configures auditing for user actions, error responses, utilization data resets, diagnostic self tests, and ACL failures.

8.7.5.2 Audit - Console Commands

8.7.5.3 Audit - Host Commands

Allows enabling or disabling auditing for specific host commands.

8.7.5.4 Audit - Management Commands

8.7.6 Software Info

Provides information on installed software versions and allows new software to be loaded.

8.7.6.1 Software - how to update software

8.7.7 FIPS;Licensing

Details the FIPS/Licensing tab, including License Summary, Installed Licenses, and FIPS Validated Algorithms.

8.7.7.1 License Summary - how to update Licensing

8.7.7.2 Installed Licenses

Lists all licenses currently installed on the HSM.

8.7.7.3 FIPS Validated Algorithms

8.7.8 Import Certificate

Explains how to load a TLS certificate into the payShield for secure host communications.

8.7.8.1 General Information

8.7.8.2 TLS Management

Guides on installing a certificate for securing payShield Manager connections.

8.8 Operational

8.8.1 Local Master Keys

Explains Local Master Keys (LMKs), their use in encrypting operational keys, and their security settings.

8.8.1.1 Generate LMK - create trusted officer

8.8.1.2 Verify an LMK Card

Explains how to verify an LMK card by reading its data and comparing check values.

8.8.1.3 Create an Authorizing Card

8.8.1.4 Duplicate an LMK Card

Provides instructions on how to duplicate an LMK card to create copies for backup or distribution.

8.8.1.5 Generate an LMK

8.8.1.6 Install an LMK from RLMK Card Set

Guides on installing an LMK into Key Change Storage from a set of RLMK cards.

8.8.1.7 Delete an Installed LMK

8.8.1.8 Replace an installed LMK

Details the procedure for replacing an installed LMK with a new one, including loading components and confirming details.

8.8.1.9 Set the Default LMK

8.8.1.10 Set the Management LMK

Describes how to set a management LMK for HSM purposes not linked to a particular LMK, like authenticating audit trails.

8.8.1.11 Enter Authorized State

8.8.1.12 Single Authorization Mode

Details the Single Authorization Mode, requiring two cards with authorizing PINs to authorize activities.

8.8.1.13 Multiple Authorization Mode

8.8.1.14 Key Change Storage

Explains the Key Change Storage table, a tamper-proof memory area for storing old LMKs used in LMK migration.

8.8.1.15 Install LMK from RLMK card set

8.9 Domain

Explains how to control domains and cards, and displays information on loaded certificates.

8.9.1 payShield Security Group

8.9.2 Security Domain

Manages domains and cards, displaying information on loaded certificates and available operations.

8.9.2.1 Commission a Smart Card

8.9.2.2 Decommission a Card

Explains how to decommission a card by erasing its certificates, making it unusable until recommissioned.

8.9.2.3 Copy a Domain Card

8.9.2.4 Create a New Security Domain

Guides on creating a new security domain by entering various parameters like shares, quorum, and common name.

8.9.2.5 HRK Operations

8.10 Configuration

Covers various configuration settings, including Host, Printer, Security, Management, General, Commands, Audit, and SNMP settings.

8.10.1 Host Settings

8.10.2 Active Host Interface

Shows the current active Host interface (Ethernet or FICON) and allows selection.

8.10.3 Ethernet

8.10.3.1 IP

Allows network settings configuration for each Ethernet interface, including IP address, subnet mask, and gateway.

8.10.3.2 Access Control List (ACL)

8.10.3.3 TCP;UDP

Configures TCP and UDP protocol settings, including port, connections, and keepalive parameters.

8.10.3.4 TLS

8.10.3.5 Printer Settings

Allows configuration of connected printers, including port, status, timeout, and line feed order.

8.10.4 Security Settings

8.10.4.1 Security Parameter Descriptions

Refers to the payShield 10K Security Manual for detailed descriptions of security parameters and their settings.

8.10.5 Management Settings

8.10.5.1 Management - Interface

Configures network settings for the Management Ethernet interface, including MAC address and IP configuration.

8.10.5.2 Management - Timeouts

8.10.5.3 Management - TLS Certificate

Displays the certificate created during the security domain (CTA) establishment.

8.10.6 General Settings

8.10.6.1 General - PIN Blocks

Allows enabling or disabling specific PIN Block formats on the HSM when in offline or secure state.

8.10.6.2 General - Alarms

8.10.6.3 General - Fraud

Configures fraud detection settings, including HSM reaction to exceeding limits and PIN validation failure limits.

8.10.6.4 General - Date and Time

8.10.6.5 General - Miscellaneous

Allows setting HSM System Name, Description, Location, and Contact fields for identification.

8.10.7 Configure Commands

8.10.8 Audit Settings

Configures the HSM's auditing capabilities to log various events in the Audit Log.

8.10.8.1 Audit - General

8.10.8.2 Audit - Console Commands

Allows enabling or disabling auditing for specific console commands.

8.10.8.3 Audit - Host Commands

8.10.8.4 Audit - Management Commands

Enables auditing of all HSM Manager events, including logins, state changes, and configuration changes.

8.10.9 SNMP Settings

8.10.10 Load;Save Settings

Allows saving active configurations to a smartcard, reloading data, or resetting HSM to factory defaults.

8.11 Virtual Console

9 Migrating LMKs

Explains the facility to migrate between LMKs for re-encrypting operational keys and data.

9.1 Introduction

9.2 Multiple LMKs

Discusses the payShield 10K's ability to install multiple LMKs and their management by security officers.

9.3 Overview of the process

9.4 Generating new LMK component Smart Cards

Details the first stage of LMK setup: creating smart cards with components for the new LMK.

9.4.1 Types of LMK component cards

9.5 Formatting LMK Smart Cards

Explains the need to format smart cards before writing LMK components, except for RLMK cards.

9.6 Generating LMK Component Cards

9.7 Creating Copies of LMK Component Cards

Emphasizes the importance of making copies of LMK component cards for security and distribution.

9.7.1 Duplicating HSM LMK cards

9.8 Loading the new LMK

Details how to install the new LMK into Live storage or Key Change storage using Console or payShield Manager.

9.8.1 Using the Console

9.8.1.1 Loading (or forming) the LMK

Describes the process of loading an LMK using console commands, including the required HSM states.

9.8.1.2 Checking the LMK

9.8.2 Using payShield Manager

Details how to load the new LMK using the Install button in payShield Manager tabs.

9.9 Loading the old LMK

9.9.1 Using the Console

Describes loading the old LMK into Key Change Storage using the LO console command.

9.10 Migrating keys between Variant LMKs

9.10.1 BW Host command

Examines the BW host command for converting operational keys from an old LMK to a new LMK of the Variant type.

9.11 Migrating keys from Variant to Key Block LMKs

9.11.1 BW Host command

Describes the BW host command structure for migrating keys from Variant LMKs to Key Block LMKs.

9.12 Migrating keys between Key Block LMKs

9.12.1 BW Host command

Details the BW host command structure for migrating keys between Key Block-type LMKs.

9.13 Migrating keys from Key Block to Variant LMKs

9.14 Migrating keys for PCI HSM compliance

Explains how to move keys to meet PCI PTS HSM security standards.

9.15 Re-encrypting PINs

9.15.1 BG Host Command

Describes the structure of the BG host command used for re-encrypting PINs.

9.16 Re-encrypting decimalization tables

9.17 Switching to the new LMK

Describes the system state after migrating to a new LMK and synchronizing applications.

9.18 Taking advantage of Multiple LMKs

9.19 Clean-up after migration to a new LMK

Covers the steps for cleaning up after migrating to a new LMK, including deleting old LMKs.

9.19.1 Deleting the Old LMK from Key Change Storage

9.19.1.1 Using the console

Explains how to delete an LMK from Key Change Storage using the DO console command.

9.19.1.2 Using payShield Manager

9.19.1.3 Using a Host Command

Details the BS host command for erasing an LMK in Key Change Storage.

Appendix A - Console Commands

Enabling and disabling console commands

Explains the syntax for enabling and disabling console commands, including the use of wildcards.

Configuration Commands

Reset to Factory Settings (RESET)

Describes the RESET command to return the HSM to its factory default state, erasing all configuration and data.

Upload Software and Licenses (UPLOAD)

Configure Commands (CONFIGCMDS)

Describes the CONFIGCMDS command to view, enable, or disable host and console commands.

Configure PIN Block Formats (CONFIGPB)

Configure Security (CS)

Sets the security configuration of the HSM and processing parameters, with options for saving to a smartcard.

View Security Configuration (QS)

Configure Host Port (CH)

Configures the Host port to emulate data communications equipment, allowing settings to be saved to a smartcard.

Host Port Access Control List (ACL) Configuration (CONFIGACL)

Configure Printer Port (CP)

Selects and configures a connection to a printer attached via USB port.

View Printer Port Configuration (QP)

Configure Management Port (CM)

Configures the Management port, an Ethernet port used solely for HSM management.

View Management Port Configuration (QM)

Configure Auxiliary Port (CA)

Configures the Auxiliary port, an Ethernet port used for SNMP traffic transmission.

View Auxiliary Port Configuration (QA)

Configure Alarms (CL)

Enables or disables motion alarms and configures temperature alarms.

View Alarm Configuration (QL)

View;Change Instantaneous Utilization Period (UTILCFG)

Displays and allows amendment of the period for collecting instantaneous utilization statistics.

Suspend;Resume Collection of Utilization Data (UTILENABLE)

Suspend;Resume Collection of Health Check Counts (HEALTHENABLE)

Suspends or resumes the collection of Health Check counts, useful when data is not required.

View SNMP Settings (SNMP)

Add an SNMP User (SNMPADD)

Adds an SNMP User for SNMP version 3, requiring username, authentication, and privacy algorithms.

Delete an SNMP User (SNMPDEL)

Configure SNMP Traps (TRAP)

Displays and configures individual SNMP Trap settings.

Add a new SNMP Trap (TRAPADD)

Delete an SNMP Trap (TRAPDEL)

Deletes an SNMP Trap destination.

Fraud Detection Commands

Configure Fraud Detection (A5)

Sets the configuration of the HSM fraud detection function, defining responses and limits for failures.

Re-enable PIN Verification (A7)

Diagnostic Commands

Lists console commands for performing diagnostic operations on the payShield 10K.

Diagnostic Test (DT)

View Software Revision Number (VR)

Displays software release number, revision number, and build number.

View Available Commands (GETCMDS)

Show Network Statistics (NETSTAT)

Records and displays network activity details on Management and Host Ethernet ports for diagnostic purposes.

Test TCP;IP Network (PING)

Trace TCP;IP route (TRACERT)

Displays the path taken from the HSM to a specified address, showing hop details.

View;Reset Utilization Data (UTILSTATS)

View;Reset Health Check Counts (HEALTHSTATS)

Displays Health Check counts and allows resetting accumulated data, requiring specific HSM states for reset.

Local Master Keys

Types of LMKs

Describes Variant LMKs and Key Block LMKs, detailing their characteristics and algorithms.

Multiple LMKs

Attribute

Details the attributes associated with each LMK slot, including ID, Key Scheme, Algorithm, Status, Comments, Authorization, and Old/New Status.

LMK Commands

Generate LMK Component(s) (GK)

Generates key components for LMKs and stores them on smartcards, supporting various LMK types.

Load LMK (LK)

Load Old LMK into Key Change Storage (LO)

Explains loading an old LMK component set into Key Change Storage for key translations.

Load New LMK into Key Change Storage (LN)

Verify LMK Store (V)

Confirms the check value of an installed LMK by comparing it with the value recorded during installation.

Duplicate LMK Component Sets (DC)

Delete LMK (DM)

Describes how to delete a selected LMK and its corresponding entry in key change storage.

Delete Old or New LMK from Key Change Storage (DO)

View LMK Table (VT)

Displays the LMK table and the corresponding table for key change storage, showing LMK details.

Generate Test LMK (GT)

Key Management Commands

Lists host commands for generic key management operations like generation, import, and export.

Generate Key Component (GC)

Generate Key and Write Components to Smartcard (GS)

Generates a key in components and writes them to smartcards, encrypting the formed key.

Encrypt Clear Component (EC)

Form Key from Components (FK)

Builds a key from components, forcing odd parity if clear components are used.

Generate Key (KG)

Import Key (IK)

Translates a key from encryption under a ZMK to encryption under an LMK.

Export Key (KE)

Generate a Check Value (CK)

Generates a key check value (KCV) for a key encrypted under a specified LMK.

Set KMC Sequence Number (A6)

Payment System Commands

Lists console commands supporting card payment systems host commands.

Generate a Card Verification Value (CV)

Generate a VISA PIN Verification Value (PV)

Generates a VISA PIN Verification Value (PVV) using a PVK and PIN data.

Load the Diebold Table (R)

Encrypt Decimalization Table (ED)

Encrypts a 16-digit decimalization table for use with host commands using IBM 3624 PIN Generation & Verification.

Translate Decimalization Table (TD)

Generate a MAC on an IPB (MI)

Generates a MAC on the Cryptogram component of a CAP IPB.

Smartcard Commands

Format an HSM Smartcard (FC)

Formats an HSM smartcard for LMK storage or HSM settings, with notes on legacy smartcard compatibility.

Create an Authorizing Officer Smartcard (CO)

Verify the Contents of a Smartcard (VC)

Verifies key components or shares on a smartcard by comparing computed check values.

Change a Smartcard PIN (NP)

Read Unidentifiable Smartcard Details (RC)

Reads details from otherwise unidentifiable smartcards, like RACCs and RLMKs.

Eject a Smartcard (EJECT)

DES Calculator Commands

Lists console commands for encryption/decryption of data with DES keys.

Single-Length Key Calculator (N)

Double-Length Key Calculator ($)

Encrypts and decrypts data blocks using a given double-length key.

Triple-Length Key Calculator (T)

payShield Manager Commands

Lists console commands used to configure HSM for payShield Manager use.

Add a RACC to the whitelist (XA)

Decommission the HSM (XD)

Decommissions the HSM by deleting payShield Manager keys and groups.

Remove RACC from the whitelist (XE)

Commission the HSM (XH)

Commissions the factory warranted HSM, requiring CTA smartcards and key cards.

Generate Customer Trust Authority (XI)

Make an RACC left or right key (XK)

Defines a RACC as a left or right key in the HSM whitelist.

Commission a smartcard (XR)

Transfer existing LMK to RLMK (XT)

Transfers an existing HSM LMK from legacy smartcards to payShield Manager RLMK cards.

Decommission a smartcard (XX)

HSM commissioning status (XY)

Shows the state of HSM Management commissioning and whitelist, including trust status and authorized RACCs.

Duplicate CTA share (XZ)

Secure Host Communications

Configures payShield 10K for secure host connections using TLS.

Generate Certificate Signing Request (SG)

Import Certificate (SI)

Imports a certificate for storage in the HSM for secure host communications.

Export HSM Certificates Chain of Trust (SE)

View Installed Certificate(s) (SV)

Lists currently installed certificates, their status, and chain of trust validity.

Delete Installed Certificate(s) (SD)

Generate HRK (SK)

Generates a new HSM Recovery Key (HRK) for backing up secret key material.

Change HRK Passphrase (SP)

Restore HRK (SL)

Restores the HRK and backed-up secret key material in case of tamper-protected memory erasure.

KMD Support Commands

Generate KTK Components (KM)

Generates components of a KMD Transport Key (KTK) and stores them on smartcards.

Install KTK (KN)

View KTK Table (KT)

Displays the KTK table, listing all KTKs currently installed in the HSM.

Import Key encrypted under KTK (KK)

Delete KTK (KD)

Deletes a selected KTK from the HSM.

Error Responses Excluded from Audit Log

Appendix B - Configuring Ports Using the Console

Describes how to physically configure the payShield HSM to work with the Host system via console commands.

Configure the Management Port

B.1 Configure the Management Port

Configures the Management port, an Ethernet port used solely for HSM management.

B.2 Configure the Printer Port

B.3 Configure the Host Ports

Configures HSM Host interfaces using the Console to emulate data equipment, with an option to save settings to a smart card.

B.3.1 Configuring the Software

B.3.1.1 Message Header Length

Explains the message header used in transactions, its purpose, and configurable length.

B.3.1.2 Ethernet Communications

B.3.1.3 Software Parameters

Lists various prompts for configuring software parameters like message header length, TCP/IP sockets, and IP addresses.

Appendix C - Commission payShield Manager using Console Commands

C.1 Background information

Explains the payShield's trust model with two key hierarchies: Pre-placed Trust and Customer Trust Authority (CTA).

C.2 Prerequisites

C.3 Procedure

Outlines the procedure for commissioning the payShield, including securing the HSM and generating a Customer Trust Authority.

C.3.1 Secure the HSM

C.3.2 Generate a Customer Trust Authority

Explains how to generate a Customer Trust Authority using the XI console command and store shares on smartcards.

C.3.3 Create the HRK passphrases

C.3.4 Commission the HSM

Describes the XH console command for commissioning a factory warranted HSM, requiring CTA smartcards and key cards.

C.3.5 Commission Smart Cards

C.3.6 Migrate LMK Cards to become RLMK Cards

Details how to transfer existing HSM LMKs from legacy smartcards to payShield Manager RLMK cards using the XT console command.

Appendix D - Technical Support Contacts

https:;;supportportal.thalesgroup.com;csm

Link to the Thales support portal for technical assistance, warranty, and support information.

Thales payShield 10K Specifications

General IconGeneral
BrandThales
ModelpayShield 10K
CategoryNetwork Card
LanguageEnglish

Related product manuals