Managing HSM Users and Keys in AWS CloudHSM - AWS CloudHSM

Managing HSM Users and Keys in AWS CloudHSM

Before you can use your AWS CloudHSM cluster for cryptoprocessing, you must create users and keys on the HSMs in your cluster. See the following topics for more information about managing HSM users and keys in AWS CloudHSM. You can also learn how to use quorum authentication (also known as M of N access control).