System Requirements

Table 873: System Requirements provides the recommendations for minimum system specifications used by Keyfactor Command components. All servers may be deployed as virtual machines and may be part of a clustering or load-balanced architecture, if desired. If the Keyfactor Command roles are co-located, the specifications may need to be scaled accordingly. All Microsoft-supported methods for making SQL Server highly available are supported. For most high availability requirements, Keyfactor recommends using always on availability groups (see SQL Server).

Important:  SSHClosed The SSH (secure shell) protocol provides for secure connections between computers. It provides several options for authentication, including public key, and protects the communications with strong encryption. management in Keyfactor Command with the Keyfactor Bash OrchestratorClosed The Bash Orchestrator, one of Keyfactor's suite of orchestrators, is used to discover and manage SSH keys across an enterprise. (see SSH) is only supported when using Active Directory as an identity provider (see Selecting an Identity Provider for Keyfactor Command). The SSH option in the Management Portal will only appear when Keyfactor Command is installed using Active Directory as an identity provider (and with a license that supports SSH).

Table 873: System Requirements

Component

Minimum Requirements

Keyfactor Command Server
Add
(Management Portal, Keyfactor API, CA Connector API, and Services roles)

Microsoft SQL Database

Ability to connect to a Microsoft SQL Server 2017, 2019, or 2022 all with TLS encryption enabled and compatibility level 130 or higher.

16 GB RAM, 4 CPUs, 500 GB disk

Note:  These are minimum requirements. Actual requirements can vary significantly depending on your specific implementation.
Browser to Access the Management Portal
  • Chrome: 99.0.4844.74+

  • Firefox: 98.0+

  • Microsoft Edge: 99.0.1150.30+

EJBCA CA (Optional)
  • EJBCA Enterprise version 7.8.1 or later is supported.

  • The EJBCA REST API must be enabled to interoperate with Keyfactor Command (see System Configuration -> Protocol Configuration in the EJBCA administration portal).