IBM® offers
two Cryptographic Coprocessors, which are available on a variety of server
models.
The IBM 4764
Cryptographic Coprocessor is available on eServer™ i5 models as hardware feature
code 4806. Depending on the model of server you have, the following table
shows the maximum number of Cryptographic Coprocessors supported:
Table 1. Supported
number of 4764 Cryptographic Coprocessors server models |
Maximum per server |
Maximum per partition |
eServer i5 Models 570 8/12/16W, 595 |
32 |
8 |
eServer i5 Models 520, 550, 570 2/4W |
8 |
8 |
The IBM 4758-023
Cryptographic Coprocessor is available on eServer i5 servers as hardware feature
code 4801. Depending on the model of server you have, the following number
of Cryptographic Coprocessors are supported:
Table 2. Supported number
of 4758 Cryptographic Coprocessors server models |
Maximum per server |
Maximum per partition |
eServer Models 840, 870, 890 and eServer i5
Models 570 8/12/16W, 595 |
32 |
8 |
eServer Models 810, 820, 825, 830 and eServer i5
Models 520, 550, 570 2/4W |
8 |
8 |
eServer i5 Model 800 |
4 |
4 |
eServer i5 Model 270 |
3 |
3 |
The Cryptographic Coprocessors can be used to augment your server in the
following ways:
See “Manage multiple Cryptographic Coprocessors” on page 175 for more
information regarding the management of multiple cryptographic coprocessors.
[Links to related pages here:]
- Features: Cryptographic Coprocessors contain hardware engines, which perform
cryptographic operations used by i5/OS application programs and i5/OS SSL transactions.
Each IBM Cryptographic
Coprocessor contains a tamper-resistant hardware security module (HSM) which
provides secure storage for store master keys. The HSM is designed to meet
FIPS 140 security requirements. To meet your capacity and high availability
needs, multiple Cryptographic Coprocessors are supported. The features information
describes in greater detail what the Cryptographic Coprocessors and CCA CSP
have to offer.
- Requirements: Your server must meet some requirements before you can install
and use a Cryptographic Coprocessor. Use the requirements page to determine
whether you are ready to install and use a Cryptographic Coprocessor on your
server.
- Cryptography concepts: Depending on your familiarity with cryptography,
you may need more information about a term or concept. This page introduces
you to some basic cryptographic concepts.
- Related information: See Related information for additional sources of
cryptography information recommended by IBM.