Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Changed sentence under Atos Bull Trustway Proteccio NetHSM

This article provides a list of supported platforms, formats, and third party products, for use with Smart ID Certificate Manager (CM). All listed hardware and software can be used in supported configurations of the product.

...

Expand
titleWeb application server

CM Web Services and Protocol Gateway servlets require a servlet engine supporting the Java API for Servlets v3.1. Apache Tomcat version 10.1 is the recommended engine.


Expand
titlePersonal Desktop Client

Nexus Personal Desktop Client is a middleware for use on CM clients, for officer smart card authentication and personalization of smart cards.

Use these versions of Personal Desktop Client, they are included in the CM delivery.

For operating systems:

  • 5.9 for Windows, RedHat, RockyLinux, CentOS

  • 5.3.1 for OpenSUSE

...

Expand
titleHardware Security Modules

A PKCS#11 compliant device can be used for handling of CA key pairs, system keys, protection of archived keys, and for key generation.

For functional specifications, known issues and limitations related to current PKCS#11 drivers, see each HSM vendor’s web site. 

The following devices are explicitly verified for Certificate Manager and for Nexus OCSP Responder:

  • AEP Systems Sureware Keyper, FIPS 140-1 level 4
  • Atos Bull Trustway Proteccio NetHSM

    • Has not been verified for CA key operations with the CIS. Not verified for use with CF server TLS certificate, PIN certificate and the KAR functionality.

  • DocuSign ARX PrivateServer
  • Gemalto SafeNet ProtectServer Internal - Express 2
  • Gemalto SafeNet ProtectServer External 2
  • Thales Luna CA3, FIPS 140-1 lvl 3
  • Thales Luna CA4, FIPS 140-2 lvl 3
  • Thales Luna SA 4.4, FIPS 140-2 lvl 3
    • When used with CM, since Thales Luna disallow key export when in FIPS mode, enable non-FIPS mode for use with CM KAR, Key Archiving and Recovery.
  • Thales Luna SA 5.0, FIPS 140-2 lvl 3
    • When used with CM, since Thales Luna disallow key export when in FIPS mode, enable non-FIPS mode for use with CM KAR, Key Archiving and Recovery.
  • Thales Luna G5
  • Thales Luna HSM 6

  • Thales Luna Network HSM 7
  • Thales Luna PCIe HSM 7
  • IBM 4758, FIPS 140-1 level 3 and 4
  • Nitrokey HSM 2
  • Entrust nShield Connect+, FIPS 140-2 level 3
  • Entrust nShield Solo+, FIPS 140-2 level 3
  • Entrust nShield Edge
  • Utimaco CryptoServer Security Server CS 10/50 LAN/PCI, FIPS 140-2 level 3 (level 4 for physical)
  • Utimaco CryptoServer CP5
  • Utimaco CryptoServer Security Server Se 12/52/420/1200 LAN/PCI, FIPS 140-2 level 3
  • Yubico YubiHSM 2
Note
PIN decryption is not allowed using a FIPS mode HSM.


...