Virtual HSM
Home
  • Virtual HSM
  • Documentation
    • What is Virtual HSM?
    • Use Case: Attested Secret Provisioning in the Cloud
    • Setup
      • Install
      • vHSM Server Configuration
        • Parameters
        • vHSM Telemetry Parameters
      • vHSM Agent
        • Agent Configuration
      • vHSM Proxy
        • Proxy Configuration
    • Get Started
      • Start the Vault server
      • MariaDB root admin password provisioning on Azure DCXas_v5 VM
    • Supported Cloud Configurations
  • Tutorials
    • Deploying the vhsm Container on an EC2 Instance
    • CLI quickstart
    • vHSM Agent quickstart
    • vHSM Proxy quickstart
    • Passing vHSM secrets using ConfigMaps
    • Provisioning MariaDB Password on Azure DCXas_v5 VM
    • Registering a buckypaper plugin
    • Monitoring vHSM with Grafana
  • Integration with Utimaco SecurityServer
    • Integrate enclaive vHSM with Utimaco HSM
  • API
    • Auth
    • Default
    • Secrets
    • System
    • Identity
    • Models
  • vHSM CLI
    • Server and Infrastructure Management
      • vhsm server
      • vhsm proxy
      • vhsm monitor
      • vhsm status
      • vhsm agent
    • Secret Management
      • vhsm read
      • vhsm write
      • vhsm delete
      • vhsm list
      • vhsm secrets
        • vhsm secrets enable
        • vhsm secrets disable
        • vhsm secrets list
        • vhsm secrets move
        • vhsm secrets tune
      • vhsm unwrap
    • Configuration and Management
      • vhsm plugin
        • vhsm plugin info
        • vhsm plugin deregister
        • vhsm plugin list
        • vhsm plugin register
        • vhsm plugin reload
        • vhsm plugin reload-status
      • vhsm namespace
      • vhsm operator
      • vhsm print
      • vhsm path-help
      • vhsm lease
    • Auditing and Debugging
      • vhsm audit
      • vhsm debug
    • Attestation
    • Security and Encryption
      • vhsm pki
        • vhsm pki health-check
        • vhsm pki issue
        • vhsm pki list-intermediates
        • vhsm pki reissue
        • vhsm pki verify-sign
      • vhsm transit
      • vhsm ssh
      • vhsm transform
    • Authentication and Authorization
      • vhsm login
      • vhsm auth
      • vhsm token
      • vhsm policy
    • Storage and Data Mangement
      • vhsm kv
      • vhsm patch
    • vhsm version
      • vhsm version-history
  • Troubleshooting
    • CA Validity Period
    • CRL Validity Period
    • Root Certificate Issued Non-CA Leaves
    • Role Allows Implicit Localhost Issuance
    • Role Allows Glob-Based Wildcard Issuance
    • Performance Impact
    • Accessibility of Audit Information
    • Allow If-Modified-Since Requests
    • Auto-Tidy Disabled
    • Tidy Hasn't Run
    • Too Many Certificates
    • Enable ACME Issuance
    • ACME Response Headers Configuration
  • Resources
    • Community
    • GitHub
    • Youtube
    • CCx101 wiki
Powered by GitBook
On this page
  • Register Nitride
  • Enable Remote Attestation through TLS
  • Next

Was this helpful?

  1. Documentation
  2. Get Started

Activate Nitride

Last updated 8 months ago

Was this helpful?

On this page you learn how to

Register Nitride

To register the Nitride plugin, use the following command with the correct SHA-256 digest from or calculate it from the binary inside the docker image:

vhsm plugin register -sha256=<digest> auth vault-plugin-auth-ratls

To verify successful registration, run the command below and look for vault-plugin-auth-ratls in the list:

vhsm plugin list | grep vault-plugin-auth-ratls

Enable Remote Attestation through TLS

To enable remote attestation and expose the endpoint path /ratls, execute the following command:

vhsm auth enable -path=ratls vault-plugin-auth-ratls

Run the command below to confirm that the endpoint has been enabled correctly:

vhsm auth list

Example output:

Path      Type                       Accessor                                 Description                Version
----      ----                       --------                                 -----------                -------
ratls/    vault-plugin-auth-ratls    auth_vault-plugin-auth-ratls_f19319b1    remote attestation certs   v1.3
token/    token                      auth_token_a2c578f9                      token based credentials    n/a

Next

You're ready to go. The vHSM is set up. We recommend to do the tutorial, where you learn how to configure Nitride, attest a buckypaper VM and provision the admin credentials into the enclave.

MariaDB root admin secret provisioning
table
Register Nitride
Enable Temote Attestation through TLS