z/OS Cryptographic Services PKI Services Guide and Reference
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Overview of IKYSETUP

z/OS Cryptographic Services PKI Services Guide and Reference
SA23-2286-00

IKYSETUP consists of several parts:
  • A configurable section. This section assigns values to variables.
  • A section that issues RACF® commands to perform RACF administration tasks. (See Actions IKYSETUP performs by issuing RACF commands for details about the actions that various sections of code perform.)
  • A section that writes information (such as the name of the PKI Services administration group) to the log data set. The log itself consists of two parts: commands issued and other information. (See Sample IKYSETUP log data set.)
    Note: By default, IKYSETUP creates the log. You can disable recording information to the log by changing the value of one of the variables in IKYSETUP (log_dsn) to null.
The configurable section contains three parts:
  • Values you must change (by making them specific to your company, such as your company's name)
  • Values you might change depending on how you want PKI Services set up (for example, whether your setup will include ICSF)
  • Values you can optionally change (these defaults are acceptable without change, but you might want to change them to make them more specific to your company, for example the name of the PKI Services administration group, which by default is PKIGRP)
The following table illustrates the structure and divisions of IKYSETUP:
Table 1. IKYSETUP structure and divisions
Structure and divisions of IKYSETUP
Configurable section, assigns values to variables
  • Values you must change to customize (See Table 1.)
  • Values you might change that are related to setup (See Table 1.)
  • Values you can optionally change (See Table 1.)

Issues RACF commands

Records information in the log data set

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014