Edit the barbican.conf file located in /etc/barbican using your preferred text editor and add the following configuration to the file. Make sure to replace the placeholders in <> with relevant values used when initializing the PKCS#11 slot in previous steps. Additional information on the configurations can be found here.
|
|
|---|
|
|
As mentioned in the comment above the parameter, key_wrap_mechanism must be defined before any secrets are stored in the OpenStack project, as it cannot be changed afterward.
In addition to the default CKM_AES_CBC_PAD, the following key wrapping mechanisms are available:
-
CKM_AES_KEY_WRAP_PAD
-
CKM_AES_KEY_WRAP_KWP
For new deployments, OpenStack recommends using CKM_AES_KEY_WRAP_KWP, as it provides a standards-compliant implementation of AES Key Wrap with Padding (RFC 5649) and better interoperability across HSM vendors.
mkek_utimaco and hmac_utimaco keys will be generated on the Utimaco HSM in slot 0 in the next section of this document.