Open Source · TPM 2.0 · Zero Cost

Turn Every TPM Into a Full Hardware Security Module

TPM HSM is an open-source HSM platform that gives you hardware-backed key management, multi-party signing, remote attestation, and complete PKI — using the TPM 2.0 chip already in your machine.

Get Started See Features

Built on proven standards

🔒 TPM 2.0 🔐 ECDSA P-256 & RSA-2048 🔑 YubiKey PIV 🛡️ gRPC + mTLS 📋 X.509 PKI
Features

Everything You Need From an HSM

Hardware-grade key protection with the flexibility of software. No proprietary hardware required.

🔒

TPM 2.0 Key Storage

Private keys are generated inside or securely imported into the TPM. Keys never leave the chip in plaintext. Client-side wrapping with RSA-OAEP + AES-128-CFB ensures keys are encrypted before they ever touch the network.

✍️

Hardware-Enforced Signing Policies

TPM PolicySigned and PolicyAuthorize enforce who can sign. Require a specific YubiKey, a file key, or multi-party approval. The TPM itself refuses unauthorized signing — even if the server is compromised.

👥

Multi-Party Threshold Signing

Create M-of-N threshold keys stored in the TPM. Signing requires approval from a quorum of key holders. Each member authenticates with their own YubiKey or file key. No single person can sign alone.

🛡️

Remote TPM Attestation

Verify that a TPM is genuine hardware — not emulated or simulated. EK certificate chain validation against manufacturer root CAs (Intel, Infineon, STMicro, Nuvoton, AMD). PCR quotes prove system integrity.

🔑

YubiKey Integration & Attestation

Use YubiKeys as hardware-bound policy signers. Verify keys were generated on-device via Yubico attestation chain. Sign TPM operations with YubiKey PIV slots for two-factor hardware authentication.

🔗

Web of Trust & Key Registry

Register public keys and create verification certificates. Build cryptographic trust graphs with hop-distance visualization. All trust validation is client-side — the server is a dumb store.

📋

X.509 Certificate Management & PKI

Store certificates and chains. Generate PKCS#10 CSRs from TPM-protected keys with full subject and SAN support. Associate certificates with HSM keys. Build a complete public key infrastructure.

🚀

Air-Gapped Key Generation

Generate a self-contained pre-wrap script that creates and encrypts keys without any TPM or network access. Transfer the wrapped key later for import. Secure key provisioning for disconnected environments.

🖥️

Cross-Platform Desktop & Web Client

Native desktop app (Windows, macOS, Linux) with a modern dark-themed UI. Browser-based web mode with client-side crypto. Same features everywhere — choose your deployment model.

Use Cases

What Can You Build With TPM HSM?

From code signing to IoT device identity, TPM HSM covers the full spectrum of HSM and PKI use cases.

Code & Artifact Signing

Sign software releases, container images, and firmware with TPM-protected keys. Require multi-party approval so no single developer can push a signed release alone. Full audit trail via verification certificates.

Private Certificate Authority

Run your own CA with hardware-backed root and intermediate keys. Generate CSRs, manage certificate chains, and issue X.509 certificates — all protected by TPM 2.0. Replace expensive commercial CA HSMs.

SSH & TLS Key Management

Store SSH and TLS private keys in the TPM so they never exist on disk. Use hardware-enforced policies to control which users or services can sign. Rotate keys without downtime.

Multi-Party Treasury & Custody

Protect high-value signing keys with M-of-N threshold policies. Require approval from multiple stakeholders for financial transactions, cryptocurrency custody, or legal document signing.

IoT Device Identity & Attestation

Provision unique TPM-bound identities for IoT devices at manufacturing. Use remote attestation to verify device integrity before granting access. Detect firmware tampering via PCR quotes.

Zero Trust Infrastructure

Bind machine identities to TPM hardware. Attest that servers and workstations are running authorized software before granting network access. Build hardware-rooted trust for mTLS and SPIFFE/SPIRE.

Document & Contract Signing

Digitally sign legal documents, contracts, and compliance artifacts with non-repudiation. Threshold signing ensures critical documents require multiple authorized signatories.

Secrets Management Bootstrap

Use TPM attestation and sealed keys to bootstrap secrets management systems like Vault. Prove machine identity with hardware before releasing secrets. No shared passwords or tokens.

Compliance & Audit

Meet FIPS 140-2, PCI DSS, SOC 2, and eIDAS requirements for hardware key protection. Verification certificates create a cryptographic audit trail. Attestation proves keys never left hardware.

Secure CI/CD Pipelines

Sign build artifacts in CI/CD with TPM-bound keys. Attest build server integrity before signing. Threshold policies prevent a compromised pipeline from signing alone. Integrate with Sigstore and Notary.

Key Escrow & Recovery

Export keys with TPM2_Duplicate using hardware-enforced policies. Re-wrap keys for backup TPMs or disaster recovery. Duplicate policy keys ensure only authorized parties can initiate export.

Email & Messaging Encryption (S/MIME)

Store S/MIME private keys in the TPM. Sign and encrypt emails with hardware-protected keys. Generate CSRs for S/MIME certificates from your private CA. Keys are non-exportable by default.

How It Works

From Install to Signing in Minutes

TPM HSM is designed to be simple to deploy and operate.

1

Deploy the Server

Run the gRPC server on any Linux machine with a TPM 2.0 chip. Docker, bare metal, or cloud VM — your choice. One command to start.

2

Connect a Client

Launch the desktop app or open the web UI. Connect to your server over mTLS. Verify the TPM is genuine with remote attestation.

3

Import or Generate Keys

Import existing keys with client-side wrapping or generate new ones. Set signing policies: single signer, multi-party threshold, or YubiKey-bound.

4

Sign With Hardware Protection

Request signatures through the API or UI. The TPM enforces your policies before signing. Keys never leave the chip.

Compare

TPM HSM vs Traditional HSM Solutions

See how TPM HSM stacks up against commercial and cloud HSM offerings.

Capability TPM HSM Cloud HSM Hardware HSM Software Keystore
Hardware key isolation
Multi-party threshold signing Varies
Remote attestation
YubiKey integration
Web of Trust
Air-gapped key generation
Open source Varies
Per-key / per-operation fees $0 $$$$ $$$$ $0
Keys stay on your hardware
X.509 / PKI support Varies Varies

Security You Can Verify

Every security property is enforced by hardware or cryptographic proof — not promises.

Private keys never leave the TPM in plaintext. RSA-OAEP client-side wrapping ensures keys are encrypted before transmission. Only the target TPM can decrypt.

Server compromise cannot extract keys. Even with full server access, the TPM refuses to release key material. Hardware enforces the boundary.

TPM genuineness is verifiable. Remote attestation with EK certificate chains proves the TPM is real hardware from a known manufacturer.

Signing policies are hardware-enforced. Direct PolicySigned keys bake authorization into the TPM. The server cannot override or bypass the policy.

YubiKey origin is attestable. Chain verification against Yubico's root CA proves keys were generated on-device, not imported.

Trust validation is client-side. The web of trust and verification certificates are verified locally. The server stores data but cannot forge trust relationships.

Ready to Replace Your HSM?

Get started with TPM HSM in minutes. Open source, zero cost, hardware-grade security.

View on GitHub