Refer to System requirements for a list of qualified Linux operating systems.
Note:
If your organization requires compliance with FIPS 140-2 or plans on managing keys and certificates using a hardware security module (HSM), see Supported hardware security modules.