Updating Master Key Versions and Associating the Master Key with Its Version
151
5.6.4. Updating Master Key Versions and Associating the Master
Key with Its Version
The master keys stored in the TKS are accessed by the TPS to perform token operations. Some
default keys are built into the TKS, but these can be replaced by generating new masters keys. The
new master keys should be mapped to the TKS keyset configuration in the TKS
CS.cfg
file.
The default master key on a token is the first version, set by the smart card manufacturer. This has the
value
#01
in its key mapping in the TKS
CS.cfg
file:
tks.mk_mappings.#01#01=
tokenname:masterKeyId
Master keys have a numeric identifier such as 01. The TKS maps these IDs to PKCS #11 object
nicknames specified in the
masterKeyId
part of the mapping. Therefore, the first number is updated as
the master key version is updated; the second number stays consistent.
NOTE
Smart cards from the Axalto Web Store come with a default developer key set where all
keys are set to
404142434445464748494a4b4c4d4e4f
. The TKS has this key built in,
and it is referred to with the master key set #01. The TKS uses key set #01 by default.
NOTE
Always stop a subsystem instance before editing the configuration file.
1. Stop the TKS.
service pki-tks stop
2. Generate a new master key, as described in
Section 5.6.1, “Generating Master Keys”
.
3. To map to the new version of the key, add a mapping parameter,
tks.mk_mappings
, to the
TKS's
CS.cfg
file. This associates the new master key with the PKCS #11 object. For example,
for a key named
new_master
on a
nethsm
token:
tks.mk_mappings.#02#01=nethsm:new_master
To reference the security database, set the
tokenname
to
internal
. The
masterKeyId
is the
name given to the master key when it was generated.
All numeric key identifiers in mapping configurations must be suffixed with
#01
.
#02
represents
the latest master key version.
4. Each TKS configured in the TPS
CS.cfg
has a defined keyset that is associated with it:
conn.tks1.keySet=defKeySet
Summary of Contents for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Page 42: ...20 ...
Page 43: ...Part I Setting up Certificate Services ...
Page 44: ......
Page 190: ...168 ...
Page 208: ...186 ...
Page 223: ...Part II Additional Configuration to Manage CA Services ...
Page 224: ......
Page 256: ...234 ...
Page 270: ...248 ...
Page 280: ...258 ...
Page 292: ...270 ...
Page 293: ...Part III Managing the Subsystem Instances ...
Page 294: ......
Page 408: ...386 ...
Page 438: ...416 ...
Page 439: ...Part IV References ...
Page 440: ......
Page 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Page 504: ...482 ...
Page 556: ...534 ...
Page 564: ...542 ...