Chapter 5. Configuring applications to use cryptographic hardware through PKCS #11