[{"id":"ci_53efe8bebdc22fe811ce60a1c823f3bac4ca36422b0ad44686fdb1ed89aea7e0","title":"Version Information and PDF Download","path":"/cyberark-vault-and-securityserver/1.0.0/version-information","children":[]},{"id":"ci_2ecbc80ccadf1c3997c09dc7c13d9df148ac66b8dddcb18849ed8c34684ea96a","title":"Introduction","path":"/cyberark-vault-and-securityserver/1.0.0/introduction","children":[{"id":"ci_4ccbc5e7852de69fb45d6a8dd73e5a11d31fdb3d433e7881fb586b7e0c4b503c","title":"About This Guide","path":"/cyberark-vault-and-securityserver/1.0.0/about-this-guide","children":[]},{"id":"ci_5110aed41a7d6552163564756277c36f9a8adf096a5a39387fd56fe697457d9a","title":"Target Audience","path":"/cyberark-vault-and-securityserver/1.0.0/target-audience","children":[]},{"id":"ci_07868e14d16b782ba2683cabff419918430b0125aaf1d33333d62298d0cef4f2","title":"Purpose of this Integration","path":"/cyberark-vault-and-securityserver/1.0.0/purpose-of-this-integration","children":[]},{"id":"ci_bb1b639f0e17a591079c44e83c4aa0d4fb4cbd1bfe6ce244ef98fc068e603846","title":"Abbreviations","path":"/cyberark-vault-and-securityserver/1.0.0/abbreviations","children":[]},{"id":"ci_497e0c31d994990fc620d14d163b22cd4ccd0dc0a5e0547ac6c6c59b6d03b23e","title":"Document Conventions","path":"/cyberark-vault-and-securityserver/1.0.0/document-conventions","children":[]}]},{"id":"ci_db036d0695ee3e626625362a9be1b131109a7612b4f4137a1ba90c5e84f92e71","title":"Product Overview","path":"/cyberark-vault-and-securityserver/1.0.0/product-overview","children":[{"id":"ci_253edc99adbc7ca7b1230683419b7fcbb41f32ee906ad01ebda13e4a0abf4016","title":"CyberArk Vault","path":"/cyberark-vault-and-securityserver/1.0.0/cyberark-vault","children":[]},{"id":"ci_ea0b1fe4c07b619dd6d28ee1a91a4918a9a49d08a854b8fa9c4ecfa800b70876","title":"Utimaco SecurityServer HSM","path":"/cyberark-vault-and-securityserver/1.0.0/utimaco-securityserver-hsm","children":[]}]},{"id":"ci_a7fd21274bf3b4246a34c44c7cf51fc8f563ca85d899d758c5fa2ca8a7aeb093","title":"Integration Requirements and Prerequisites","path":"/cyberark-vault-and-securityserver/1.0.0/integration-requirements-and-prerequisites","children":[{"id":"ci_7dc8f02b879b9d1854f9a26e1578b00e47db94e128f5737dd79b020aa3fd7366","title":"Tested Versions","path":"/cyberark-vault-and-securityserver/1.0.0/tested-versions","children":[]},{"id":"ci_852a86daaa12c2d3c3c9e61260c87826f99a7f8bbbb26e51c2eedccc5d01f0fe","title":"Software Requirements","path":"/cyberark-vault-and-securityserver/1.0.0/software-requirements","children":[]},{"id":"ci_55ee9f746bad43047b6711043be6616f31f0528f05de3969cdccf8e9877165f3","title":"Hardware Requirements","path":"/cyberark-vault-and-securityserver/1.0.0/hardware-requirements","children":[]},{"id":"ci_544d2fc198562dada59a9f1b419057359b3220a7d103b6cfae7bac672e476988","title":"Prerequisites","path":"/cyberark-vault-and-securityserver/1.0.0/prerequisites","children":[]}]},{"id":"ci_491617098f008ac5dc19fddb94a28278d6e8e236eb00ee595b2daed0ff6909f2","title":"Installing and Configuring Utimaco SecurityServer Software","path":"/cyberark-vault-and-securityserver/1.0.0/installing-and-configuring-utimaco-securityserver-","children":[{"id":"ci_2e36a666733e1b7da3916d006908e410c390ba9d47c5925eb89731b2d0f2a3e0","title":"Download and Install Utimaco Software","path":"/cyberark-vault-and-securityserver/1.0.0/download-and-install-utimaco-software","children":[]},{"id":"ci_3b7bb96c8c29da1d23482a51c9b597893bdaf63693f7c6147ab1a0ecff6434a4","title":"Update cs_pkcs11_R3.cfg","path":"/cyberark-vault-and-securityserver/1.0.0/update-cs_pkcs11_r3-cfg","children":[]},{"id":"ci_261687b26414a6990ff0762f76da73034d460235edefeaaf67b7459425624883","title":"Create SO User and Initialize a Slot","path":"/cyberark-vault-and-securityserver/1.0.0/create-so-user-and-initialize-a-slot","children":[]}]},{"id":"ci_3d19760f2d0d83487e6f31ca6beb1d0e50d8e43f932084f9bdabc7383043eb1a","title":"Integrating CyberArk Vault with Utimaco HSM","path":"/cyberark-vault-and-securityserver/1.0.0/integrating-cyberark-vault-with-utimaco-hsm","children":[{"id":"ci_0cfeaf25e0ce95ab8d2f896597939b70781cd0015ddbffb9c051b7743b4e60c2","title":"Configure CyberArk Vault to Use Utimaco HSM","path":"/cyberark-vault-and-securityserver/1.0.0/configure-cyberark-vault-to-use-utimaco-hsm","children":[]},{"id":"ci_73d3b36e750daf6ad0149a2d7d506aa47165cf352330f57242e6bcc1ad683faf","title":"Generating the Vault’s Server Key on the Utimaco HSM","path":"/cyberark-vault-and-securityserver/1.0.0/generating-the-vaults-server-key-on-the-utimaco-hs","children":[]},{"id":"ci_cef03c52fa701d78bba273eaf56776c30ea6f7f60d68ab29bda1fcbf8e2587e9","title":"Migrate Existing Server Key to HSM","path":"/cyberark-vault-and-securityserver/1.0.0/migrate-existing-server-key-to-hsm","children":[]}]},{"id":"ci_d194291faae4e8c301dc04e2a8c2e21fa2b79801aae4e37335b194b5a1609cd8","title":"Troubleshooting","path":"/cyberark-vault-and-securityserver/1.0.0/troubleshooting","children":[]},{"id":"ci_7b57277174ff7b228a330c575663b0b8b984cdf826e67d78c78104c29e403445","title":"Further Information","path":"/cyberark-vault-and-securityserver/1.0.0/further-information","children":[]},{"id":"ci_ffe8a69430800c2c578351b6a9ed746abbea69e486649ee2f56da2876eec76c4","title":"References","path":"/cyberark-vault-and-securityserver/1.0.0/references","children":[]}]