This chapter discusses how multiple cryptographic service providers (CSP) can be installed on a computer and the default providers specified. The structure of the system registry is also mentioned.