The following lists technical specifications of the Identity Authority Manager (IdAM).

General Information

Product Type Description

Identity Authority Manager – Industrial

Software Version

V1.2.0

Hardware Version

V1.0

Hardware Specification

Processor Type

Xeon E3-1505L v5 (4C/8T, 2.0 (2.8) GHz, 8 MB Cache, iAMT)

SSD

240 GB solid-state drive SATA

Memory

DDR4-2400, SO-DIMM, 16 Gbyte

Slots

1xPCIe(x4), with card retainer

Interfaces

3x Ethernet (RJ45) (100Mbps, 1Gbps)
4x USB 3.0 (PKL-INDU-APP-LRP-TA-SW)
3x USB 3.0 (PKL-INDU-APP-LRP-TA-HW)

Monitoring

Temperature
Watchdog
Status LEDs
Monitoring via Network

IP Degree of Protection

IP20

Operating Temperature

Dependent on installation. With one expansion card (with max. load 12W) in Restricted Access Location (RAL): +5°C to +35°C (+41°F to +95°F)

Storage / Transport Temperature

Min: -40°C ( -40°F)
Max: +70°C (+158°F)

Installation Type / Mounting

Mounting

DIN rail, wall mounting, portrait mounting

Design

Box PC, built-in unit

Supply Voltage

Type of Supply Voltage

24 V DC

Mains Buffering

20ms

Delivery Information

Export Control Regulation

AL: N; ECCN N (inside US ECCSN: 5A991)

Commodity Code

85176200

Country of Origin (COO)

Germany

Device Adapter

Interface Type

Custom

Physics

Ethernet, USB 3.0

Segregated Network

Yes

Number of Ports

1

Security

Optional: Configurable TLS connection (via Ethernet)

Integration

Python-based integration framework to transfer incoming message to IdAM standard message format

Virtual Machine Support

Optional (in planning)

Trust Service Adapter

Interface Type

CMP version 2

Physics

Ethernet

Segregated Network

Yes

Number of Ports

1

Security

Optional: Configurable TLS connection

Rule Engine and Administration

Interface

Browser-based administration

Physics

Ethernet

Segregated Network

Yes

Number of Ports

1

Security

Optional: Configurable TLS connection

CA Management

Built-in CA Management to configure CA Service Interface.

Signer: Support for PKCS#12 token.

Access Control

Role-Based Access Control, based on username and password.

Rule Engine

Framework for building event-based workflows. Support of Messages, Rule-Nodes, Rule Chain.

Node classes: Filter Nodes, Enrichment Nodes, Transformation Nodes, Action Nodes, Custom Nodes.

Dashboard

Free configurable, access via browser

Alarm Management

Via email alert


Security Functions

Secure Storage

Optional. Available with or without built-in Hardware Security Module (HSM).

Certificate Management

CMP version 2.
Supported message types:
Ir[0] CertReqMessages, Initialization Request

Ip[1] CertReqMessages Initialization Response
(with implicit confirm flag set; PoP (Proof of Possession); 'RAVerified' only)


General Functions

Backup / RestoreIntegrated Backup Restore concept for Rule Chains

Logging

Central log file via system log (sys-log)


Hardware Interface

The following provides an overview of the hardware interface.

  1. On/Off switch
  2. 24V DC power supply connection
  3. Protective conductor
  4. Device Adapter Interface (RJ45)
  5. Rule Engine and administration (RJ45)
  6. Trust Service Adapter (RJ45)