This is a cache of https://developer.ibm.com/tutorials/offload-transport-layer-security-hardware-security-module/. It is a snapshot of the page as it appeared on 2025-11-15T02:38:49.303+0000.
Offload Transport Layer Security using a hardware security module - IBM Developer
Transport Layer Security (TLS) encrypts communications between the client and the web server to protect against potential hackers and man-in-the-middle attacks. While encryption protects data, it introduces latency because of the additional processing the webserver must do to unencrypt data before it can be processed.
"TLS offloading" is the process of using a hardware security module (HSM) to redirect encrypted traffic away from the web server to alleviate its processing load. This process "offloads" the TLS encryption and decryption to the HSM, instead of trusting the web server to do so, which significantly reduces the risk of key compromise. It also helps with the following tasks:
Generating the SSL key pair on an HSM or cryptographic service
Storing the SSL private key on an HSM or cryptographic service
Performing the crytpographic operations for SSL on an HSM or cryptographic service
If all of the prerequisites are in place, it should take you no more than 30 minutes to complete this tutorial.
Prerequisites
Access to a RHEL 8.10 server
Access to on-premise HSM / GREP11 Services on LinuxONE; you will need the following information:
IP address to access the GREP11 server
Port number to access the GREP11 server
Certificates to access the GREP11 server, specifically:
GREP11 CA Certificate
Client Certificate
Client Key
Access to a certificate authority (CA) to create a certificate from a certificate signing request (CSR) that is being generated using a private-key from the HSM.
Note: The -X flag is a temporary measure to run HTTPD in single-threading mode, without forking.
Step 6. Test the TLS offload
Map the host name www.example.com to the IP-address of your server by editing your local (client) hosts-file.
Open a browser and go to https://www.example.com:443. If everything is working as expected, you will see a page with the following message:
Welcome to TLS Offload with HTTPD, OpenSSL & GREP11 service on a LinuxONE HSM!
Summary and next steps
Offloading Transport Layer Security with a hardware security module allows for a single, centralized point of control and management of private keys used to create certificates. If HSM services are part of a larger encryption services platform, policies can be created to align with an organization's security policies. This greatly simplifies the administration overhead and enables the separation of the security role from the application owner role by the security administrator.
The procedure described here is applicable, with some modifications, to other load balancers, web application firewalls, and caching servers.
You should now understand how to offload transport layer security using a hardware security module. For additional information, check out the following resources:
About cookies on this siteOur websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising.For more information, please review your cookie preferences options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.