See in following table the required commands for loading the configuration of a Hardware Security Module meeting the HSM requirements.
Skip this step if you use software cryptography (not recommended).
HSM | Command | Additional steps |
---|---|---|
Entrust nShield HSM | ||
Thales HSM | — |