Virtualization Deployment
In virtualization deployment scenarios, the intrinsic cryptographic module TA can be deployed on VMs and can be physically isolated from the key space on the host. This solution allows the key management tool to be executed independently on VMs.
Figure 1 Virtualization deployment architecture


Parent topic: Functions and Features