Managing HSM users and keys in AWS CloudHSM
Before you can use your AWS CloudHSM cluster for cryptoprocessing, you must create users and keys on the HSMs in your cluster. See the following topics for more information about managing HSM users and keys in AWS CloudHSM. You can also learn how to use quorum authentication (also known as M of N access control).