You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dedicated-hsm/troubleshoot.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,13 +97,14 @@ When initializing the HSM, securely store credentials. Shell and HSM credentials
97
97
98
98
### Failed Logins
99
99
100
-
Providing incorrect credentials to HSMs can have destructive consequences. The following are default behaviors for HSM Roles.
100
+
Providing incorrect credentials to HSMs can have destructive consequences. The following are default behaviors for HSM Roles.
101
+
101
102
| Role | Threshold (# of tries) | Result of too many bad login attempts | Recovery |
102
103
|--|--|--|--|
103
-
| HSM SO | 3 | HSM is zeroized (all HSM objects identities, and all partitions are gone) | HSM must be reinitialized. Contents can be restored from backup(s).|
104
-
| Partition SO |10 | Partition is zeroized. | Partition must be reinitialized. Contents can be restored from backup.|
105
-
| Audit |10 |Lockout |Unlocked automatically after 10 minutes.|
106
-
| Crypto Officer |10 (can be decreased) |If HSM policy 15: Enable SO reset of partition PIN is set to 1 (enabled), the CO and CU roles are locked out.<br>If HSM policy 15: Enable SO reset of partition PIN is set to 0 (disabled), the CO and CU roles are permanently locked out and the partition contents are no longer accessible. This is the default setting. |CO role must be unlocked and the credential reset by the Partition SO, using `role resetpw -name co`.<br>The partition must be re-initialized, and key material restored from a backup device.|
104
+
| HSM SO | 3 | HSM is zeroized (all HSM objects identities, and all partitions are gone) | HSM must be reinitialized. Contents can be restored from backup(s). |
105
+
| Partition SO |10 | Partition is zeroized. | Partition must be reinitialized. Contents can be restored from backup. |
106
+
| Audit |10 |Lockout |Unlocked automatically after 10 minutes. |
107
+
| Crypto Officer |10 (can be decreased) |If HSM policy 15: Enable SO reset of partition PIN is set to 1 (enabled), the CO and CU roles are locked out.<br>If HSM policy 15: Enable SO reset of partition PIN is set to 0 (disabled), the CO and CU roles are permanently locked out and the partition contents are no longer accessible. This is the default setting. |CO role must be unlocked and the credential reset by the Partition SO, using `role resetpw -name co`.<br>The partition must be re-initialized, and key material restored from a backup device. |
107
108
108
109
## HSM Configuration
109
110
@@ -124,13 +125,11 @@ Some configuration changes require the HSM to be power cycled or rebooted. Micro
124
125
A client may lose connectivity to an HSM when a certificate expires or has been overwritten through configuration updates. The certificate exchange client configuration should be reapplied with each HSM.
125
126
Example NTLS logging with invalid certificate:
126
127
127
-
```console
128
-
NTLS[8508]: info : 0 : Incoming connection request... : 192.168.50.2/59415
129
-
NTLS[8508]: Error message from SSLAccept is : error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca
130
-
NTLS[8508]: Error during SSL accept ( RC_SSL_ERROR )
131
-
NTLS[8508]: info : 0xc0000711 : Fail to establish a secure channel with client : 192.168.50.2/59415 : RC_SSL_FAILED_HANDSHAKE
0 commit comments