Opening a cryptographic token using the key management utility (iKeyman)

You can use the key management utility to open a cryptographic token. Once opened, you can manage your keys and certificates just like you do with keystore and truststore files.

Before you begin

Verify that your cryptographic token device is installed and functions properly. Create a cryptographic token, following the instructions provided by the manual of the cryptographic device.

From your cryptographic token device documentation, identify the token library. For example, the IBM 4758 PCI Cryptographic Card uses CRYPTOKI.DLL as the PKCS#11-type token library. For more information, see CryptoCards.

Read the IKeyman documentation located in the http://www-128.ibm.com/developerworks/java/jdk/security for further information about using the key management utility (iKeyman).

Important
Note: To use iKeyman for key management with a cryptographic token device, you must edit the app_server_root/java/jre/lib/security/java.security file. Uncomment the line containing com.ibm.crypto.pkcs11.provider.IBMPKCS11.

About this task

You can use the key management utility to open a cryptographic token. Once opened, you can manage your keys and certificates just like you do with keystore and truststore files:

Procedure

  1. Start the key management utility, if it is not already running.
  2. Click Key DataBase File > Open.
  3. Click Cryptographic Token from the list of key database types.
  4. Fill in the information for File Name and Location, or browse for the cryptographic device library.
  5. Click OK to open the library.
  6. Type in the slot number in the next panel. This is the number of the slot in which you previously created the cryptographic token.
  7. Enter the password. This is the password configured for the cryptographic token that you created.

Results

All of the personal and signer certificates are stored on the cryptographic token card. With the token open, you can create or request digital certificates and receive CA-signed certificates.

What to do next

Use a cryptographic token device as a key database to manage keys and certificates for an Secure Sockets Layer (SSL) connection. Once the cryptographic token is open, you can add or delete keys and certificates. Configure the cryptographic token settings in WebSphere Application Server.



In this information ...


Related reference

IBM Redbooks, demos, education, and more

(Index)

Use IBM Suggests to retrieve related content from ibm.com and beyond, identified for your convenience.

This feature requires Internet access.

Task topic    

Terms of Use | Feedback

Last updated: Aug 29, 2010 7:21:45 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=vela&product=was-nd-dist&topic=tsecikeycrypto
File name: tsec_ikeycrypto.html