See in following table the required commands for loading the configuration of a Hardware Security Module meeting the HSM requirements.
Skip this step if you use software cryptography (not recommended).
| HSM | Command | Additional steps | 
|---|---|---|
| Entrust nShield HSM | ||
| Thales HSM | — |