31.01.2013 Views

RSA Keon Ready Implementation Guide For PKI 3rd Party Application

RSA Keon Ready Implementation Guide For PKI 3rd Party Application

RSA Keon Ready Implementation Guide For PKI 3rd Party Application

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

module had been used with another Security World then you must initialize that module using<br />

initunit command before using sw-rest.<br />

This procedure can be used to move the Security World from one machine to another, including<br />

across platforms.<br />

Loss of Hard Drive Data<br />

If files containing the Security World data are lost (e.g. \kmdata directory), you may simply<br />

restore the files from backup. Any data created since the last backup will be lost. If the<br />

complete nCipher software installation is damaged or lost, follow the procedure given under “<br />

Loss of Hardware” in the nShield User <strong>Guide</strong>, provided a backup of the Security World data<br />

exists.<br />

Useful nCipher Commands<br />

�� enquiry to confirm versions of server software and module firmware<br />

�� ckcheckinst to get PKCS #11 library version (the library description is the number of<br />

interest)<br />

�� nfkminfo to get information about the Security World, i.e. whether recovery option is<br />

enabled<br />

6. Known Issues<br />

None

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!