Using the coprocessor master key to encrypt the certificate private key
For extra security to protect access to and use of a certificate's private key, you can use the master key of an IBM® Cryptographic Coprocessor to encrypt the private key and store the key in a special key file. You can select this key storage option as part of creating or renewing a certificate in Digital Certificate Manager (DCM).
Before you can use this option successfully, you must use the IBM Cryptographic Coprocessor
configuration Web interface to create an appropriate keystore file. Also, you must use the
coprocessor configuration Web interface to associate the keystore file with the coprocessor device
description that you want to use. You can access the coprocessor configuration Web interface from
the IBM Navigator
for i
Bookmarks tab.
If your system has more than one coprocessor device installed and varied on, you
can choose to share the certificate's private key among multiple devices. In order for device
descriptions to share the private key, all of the devices must have the same master key. The process
for distributing the same master key to multiple devices is called cloning. Sharing the key
among devices allows you to use Transport Layer Security (TLS) load balancing, which can improve
performance for secure sessions.
Follow these steps to create a certificate with private key encrypted by a
hardware device and stored in a key store.
The following figure demonstrates the create certificate form with private key
encrypted by hardware:



The figure demonstrates the create certificate form with private key encrypted by hardware.