Configuring CyberArk Primary Vault with HSM
Configuring the CyberArk Vault firewall
The CyberArk Vault firewall must be configured to allow outgoing traffic to the HSM.
-
Open the
DBParm.in
file located inC:\Program Files (x86)\PrivateArk\Server\Conf
-
To open the firewall for traffic to your Securosys CloudHSM or on-premise HSM, add the
AllowNonStandardFWAddresses
parameter.
If you use a cluster of HSM devices, all their network connections must be configured in the DBParm.ini
file. For each HSM connected to your environment another AllowNonStandard-FWAddresses
parameter should be added.
AllowNonStandardFWAddresses=[hsm0-ip-url], Yes,2410:outbound/tcp
AllowNonStandardFWAddresses=[hsm1-ip-url], Yes,2410:outbound/tcp
Parameter | Description |
---|---|
[hsm-ip-url] | Enter the destination URL or IP of your CloudHSM service or Primus HSM. "[]" Brackets must remain. |
2410 | Enter the configured HSM PKCS#11 port (default for CloudHSM is 2410). |
Configure PKCS#11 Provider Path
Set the PKCS#11 Provider path for the Primus PKCS#11 Provider installed before.
- Ensure the Securosys PKCS#11 provider configuration file
Primus.cfg
is configured correctly. Specify the Securosys PKCS#11 provider library with thePKCS11ProviderPath
parameter in theDBParm.ini
file, as shown in the following example:
PKCS11ProviderPath=C:\Program Files\Securosys\Primus P11\primus.dll
- Restart the PrivateArk Server.
Configuring CyberArk Vault and Primus HSM Connection
Next, the PKCS#11 password used in the Primus PKCS#11 connection establishment must be configured on CyberArk Vault.
- Navigate to the PrivateArk Server directory. Within the directory open a command prompt with administrative privileges.
- Run the following command, replace the
Password
variable with thepkcs11-password
(set when configuring the HSM):
CAVaultManager.exe SecureSecretFiles /SecretType HSM /Secret Password
- Open the
DBParm.ini
file located atC:\Program Files (x86)\PrivateArk\Server\Conf
- Confirm that the
HSMPinCode
parameter with the encrypted value of the passcode can now be seen. Example:
…
[SYSLOG]
…
HSMPinCode=22B537EB552OADHG92FF89C0AB35027381FD40204HJVPDNWDFO3IR2CE15C6D55751583C4E66190F6BC6D38DFD16E3EC6455DIHF29EHF50485ED6797C293C04200AB2F
Now the setup is complete and you can use CyberArk Vault with the HSM.