Step 1 - Configuring Hardware Crypto Source
In order to store the user keys securely inside the hardware crypto source e.g. HSM for SAM Service, see Key Manager for more details on configuring Hardware profile.
See also
Step 1 - Configuring Hardware Crypto Source
Step 2 - Configuring SAM Profile
Step 3 - Registering Business Application