You can configure PingFederate to use a hardware security module (HSM) for cryptographic material storage and operations. When configured, private keys and their corresponding certificate are stored on the HSM. Related signing and decryption operations are processed there for enhanced security. Leveraging an HSM can help achieve FIPS 140-2 compliance for your deployment.

You can also integrate PingFederate with a third-party software cryptographic solution.

Hardware security modules

When integrating with an HSM, PingFederate must be deployed with Oracle Server JRE 8. Oracle Java SE Development Kit 11 and OpenJDK 11 are not supported.

Typically, integrating with an HSM involves two steps:

  1. Install and configure the HSM according to the manufacturer's documentation.
  2. Follow the vendor-specific instructions to configure a new or existing PingFederate environment to use the HSM for key generation, storage, and operation.
Tip:

Use HSM hybrid mode to store each relevant key and certificate on the HSM or the local trust store. This allows you to transition the storage of keys and certificates to an HSM without needing to deploy a new PingFederate environment to mirror the setup. For more information, see Transitioning to an HSM.

Note:

Configuring PingFederate to use an HSM for cryptographic material storage and operations might impact performance. The level of impact depends on the performance of cryptographic functionality provided by the HSM and the network latency between PingFederate and the HSM. Consult with your HSM vendor for performance tuning if you plan to use an HSM in your PingFederate deployment.

Software cryptographic solution

PingFederate supports Bouncy Castle FIPS as the provider of its Java keystore and cryptographic operations.