copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2019-08-23 |
hardware security modules, HSM, HSM roles, HSM Security Officer, Partition Security Officer, Crypto Officer, Auditor, Crypto User, Appliance Admin, HSM Security Officer, Partition Security Officer, cryptographic, keys, |
hardware-security-modules |
{:shortdesc: .shortdesc} {:external: target="_blank" .external}
{: #ibm-cloud-hsm-roles}
This topic outlines the roles that access the {{site.data.keyword.cloud}} HSM, and the cryptographic engine within or connected to the host.
{:shortdesc}
{: #mandatory-roles}
{: #optional-roles}
{: #enhanced-cryptoki-model}
The separation of roles on the SafeNet Luna Network HSM follows an enhanced Cryptoki model for the following roles:
{: #hsm-security-officer-so}
The HSM SO has control of the HSM within the SafeNet Luna Network HSM appliance. To access HSM SO functions, you must first be logged in as appliance admin. In addition to all the other appliance functions, a user who has authenticated with the HSM SO credential can:
{: #partition-security-officer-po}
The Partition Security Officer has control of one or more partitions (virtual HSMs) within the SafeNet Luna Network HSM. To access Partition SO functions, you must log in using the LunaCM utility on a registered Client computer. The Partition SO, when logged in to the partition, can:
{: #crypto-officer-co}
The Crypto Officer has full Read-Write access to the partition through the LunaCM utility on a registered Client computer. The Crypto Officer partition credential allows a Client application to perform any cryptographic operation, including:
{: #cypto-user-cu}
The Crypto User is a restricted Read-only Client user. Once initialized, the authenticated Crypto User can access cryptographic materials already existing on the partition (for signing, verifying, encrypting, decrypting), but cannot manipulate those objects (no generating, deleting, or wrapping/unwrapping). The Crypto User role is optional. If you have no security requirement for this role, it can remain uninitialized and all Client applications can access the partition using the Crypto Officer credential.