See in following table the required commands for loading the configuration of a Hardware Security Module meeting the HSM requirements.

Skip this step if you use software cryptography (not recommended).

HSM

Command

Additional steps

​Entrust nShield HSM

tsactl import-nshield

See Administrating nShield HSM integration

Thales HSM

tsactl import-thales