Secure Auditing With a hardware security module (HSM)
  • 26 Nov 2024
  • 1 Minute à lire
  • Sombre
    Lumière
  • PDF

Secure Auditing With a hardware security module (HSM)

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

To enable secure auditing for a hardware security module (HSM), a master audit key pair must be created on the HSM. This must be done before you configure OneSpan Authentication Server to use secure auditing.

The public key from the master audit key pair must be exported from the HSM to allow its use in verification.

Secure auditing with HSM

Figure: Secure auditing with HSM

OneSpan Authentication Server will request a signature from the HSM for each epoch and use this as the epoch ID. An epoch key pair will be generated, consisting of an epoch public key and an epoch private key. Each secure audit entry will contain the epoch public key, the epoch ID, and an cryptographic signature that relates it to the previous and subsequent entries.

To verify each secure audit entry, the Secure Auditing Verification Tool uses the following:

  • The epoch public key
  • The epoch ID (supplied on each secure audit line)
  • The master audit public key which has been exported to a PEM file.

The entire file will be verified with a Yes (verification successful) or No (verification unsuccessful) result provided after verification.


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle