If you are planning to use HSM to store encryption keys, then set up the following requirements before you proceed:
Important! Ensure that you have securely written down the labels of these 3DES keys. They will be used later for encrypting information in the database.
See your platform vendor documentation for detailed information about how to install and configure your HSM Server and Client components and generate the required keys.
|
Copyright © 2013 CA.
All rights reserved.
|
|