Key management procedure
  • 23 Jan 2025
  • 1 Minute à lire
  • Sombre
    Lumière
  • PDF

Key management procedure

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

Figure: Key management diagram shows the key management as expected by OneSpan. The HSM-level BLOB storage key and the HSM-level DPX transport key perform a cryptographic operation so that authenticator application can be used with Authentication Suite Server SDK for HSM. It is important to securely transfer the HSM-level DPX transport key from the customer’s HSM to the OneSpan HSM. The KEK is used for this purpose (wrapping of the HSM-level DPX transport key on the customer’s HSM, unwrapping of the key on the OneSpan HSM). The different components of this KEK are known when the key is generated. With these components, the KEK is easily exportable from the customer’s HSM to the OneSpan HSM.

Each key custodian knows only one key component. Thus, the key remains secret.

In Figure: Key management diagram, the key encrypting key is split into two components. However, we strongly recommend that you split the KEK into three components.

Figure:  Key management diagram


Cet article vous a-t-il été utile ?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle