Supported methods of key generation
There are a number of ways that keys can be generated for signing CSRs, both in terms of where they are generated (externally or within Trust Protection Platform), and how they are generated (using software or hardware methods).
You can choose whether to generate a private key on Trust Protection Platform, in a remote system, or on an HSM.
IMPORTANT If a certificate is associated with multiple applications, the CSR will always be centrally generated because Trust Protection Platform needs the private key so it can be pushed to all applications. Remote generation is supported only for a 1-to-1 (private key/application) relationship.
Depending on which key generation type you choose, the certificate's private key is stored either in Trust Protection Platform or in the remote system, and the CSR is either generated by Trust Protection Platform or the remote system.
The following chart shows how you can tell which type of key generation you're using, based on who is generating the key, where it is being generated, and how it is being generated.
The following table lists the various types of key generation and gives additional information about each key generation type.
Type |
Description |
Key Generation Location |
Private Key Storage Location |
Requires AKP? |
---|---|---|---|---|
User-generated key |
When you create the CSR yourself, the key is not stored in Trust Protection Platform, but it might potentially be stored in the system you used to generate the key. |
Third-party tool |
not stored |
No |
Hardware central key generation |
With hardware central key generation, Trust Protection Platform connects directly to the HSM and instructs the HSM to create the private key. Trust Protection Platform then exports the key from where it is stored. Trust Protection Platform uses the key to sign the CSR. |
HSM |
Trust Protection Platform (For code signing, can either be in Trust Protection Platform or the HSM) |
Yes |
Software central key generation |
With software central key generation, Trust Protection Platform generates and stores the private key. It then uses the key to sign the CSR. |
Trust Protection Platform |
Trust Protection Platform |
No |
Hardware remote key generation |
With hardware remote key generation, Trust Protection Platform connects to the remote HSM, and instructs the remote system (via a supported driver) to generate the private key using hardware generation. It then stores the private key on the HSM, and then creates the signed CSR, which is then exported to Trust Protection Platform. In this case, Trust Protection Platform never sees the private key, just the signed CSR. The key remains in the HSM. |
HSM connected to remote system |
HSM connected to remote system |
Yes |
Software remote key generation |
With software remote key generation, Trust Protection Platform connects to the remote system, and instructs the remote system to use software to generate a private key. It then stores the private key on the remote system, and creates the signed CSR, which is then exported to Trust Protection Platform. In this case, Trust Protection Platform never sees the private key, just the signed CSR. The key remains on the remote system. |
Remote system |
Remote system |
No |
To learn about the lifecycle stages of a Trust Protection Platform certificate, see About certificate lifecycle management.
Stages |
Remote key generation storage |
Central key generation storage |
---|---|---|
0-400 |
Remote system (called Application in Policy Tree) |
Trust Protection Platform |
500-700 |
Certificate Authority |
Certificate Authority |
800-1200 |
Remote system (called Application in Policy Tree) |
Application |