AWS cloud HSM
Make sure you have:
- Provisioned an AWS CloudHSM cluster ↗ .
- Installed the appropriate software library for PKCS#11 ↗.
Before importing the public key, extract it from the certificate provided by your CA. Place the contents of your private key in privkey.pem
and then run the following (replacing certificate.pem with your actual certificate) to populate pubkey.pm
.
Log in to the CloudHSM using a previously created crypto user ↗ (CU) account and generate a key encryption key that will be used to import your private key.
Referencing the key handle returned above, import the private and public key and then log out of the HSM:
Now that the keys are in place, we need to modify the configuration file that the key server will read on startup. Change the object=mykey
and pin-value=username:password
values to match the key label you provided and CU user you created.
Open /etc/keyless/gokeyless.yaml
and immediately after:
add:
With the config file saved, restart gokeyless
and verify it started successfully.