Before you can use a hardware cryptographic device, you must configure and enable it. You must first configure a hardware cryptographic device using the Secure Sockets Layer (SSL) certificate and key management panels in the administrative console. The key for the cryptographic operation can be stored in an ordinary Java keystore file and need not be stored on the hardware devices. You enable cryptographic operations by performing specific file setup procedures to ensure that the cryptographic device can be used.
In this information ...Related concepts
| IBM Redbooks, demos, education, and more |