Step 1 - Configuring Hardware Crypto Source
In order to store the user keys securely inside the hardware crypto source e.g. HSM for SAM Service, see Key Manager for more details on configuring Hardware profile.
See also
Step 1 - Configuring Hardware Crypto Source
Step 2 - Configuring Notification Settings
Step 3 - Configuring CSP Profile
Step 4 - Registering Business Application
Step 5 - Using Service Manager