Table of Contents
1 Introduction ................................................................................................................................ 5
1.1 About this Document .................................................................................................................. 5
1.1.1 Target Audience for This Manual ......................................................................................... 5
1.1.2 Contents of This Manual....................................................................................................... 5
1.1.3 Document Conventions ........................................................................................................ 6
1.2 Recommended Reading ............................................................................................................. 6
2 The PKCS#11 R2 Interface - Overview ......................................................................................... 7
3 Requirements .............................................................................................................................. 8
3.1 Required Firmware Package ...................................................................................................... 8
3.2 Location of the Configuration File cs_pkcs11_R2.cfg ................................................................ 9
4 Configuration ............................................................................................................................ 11
4.1 The Parameter Device .............................................................................................................. 13
4.2 Logging ..................................................................................................................................... 15
5 Operating Modes ....................................................................................................................... 17
5.1 Load Balancing Mode ............................................................................................................... 17
5.2 Failover Mode ........................................................................................................................... 19
5.3 Initialization of Slot and User PIN in Failover/Load Balancing Mode ...................................... 20
6 Internal and External Key Storage ............................................................................................. 22
7 Development of a PKCS#11 Application .................................................................................... 23
7.1 Libraries .................................................................................................................................... 23
8 Runtime .................................................................................................................................... 24
8.1 Initialization .............................................................................................................................. 24
8.2 Limited Data Length ................................................................................................................. 24
8.2.1 Key Wrapping with AES GCM/CCM ..................................................................................... 24
8.2.2 Initialization Vector Length for AES GCM ........................................................................... 25
8.2.3 Data Length for Key Wrapping with AES GCM/CCM ........................................................... 25
8.3 Multithreading .......................................................................................................................... 25
9 Authentication Concept ............................................................................................................. 27
9.1 Standard Authentication Concept ............................................................................................ 27
9.2 Enhanced Authentication Concept ........................................................................................... 28
9.2.1 Create Users with Other Authentication Mechanisms ........................................................ 28
9.2.2 Login User with Other Authentication Mechanisms ........................................................... 30
9.2.3 Change PIN for Other Authentication Mechanisms ............................................................ 32
9.2.4 Authentication via Configuration File ................................................................................. 33
9.2.5 Automatic Login of Administrator via Configuration File ................................................... 36
9.2.6 Authentication According to the Two-Person Rule ............................................................ 36