Setting up access control to protect
PKI Services
This task can be divided into two steps:
Protecting end-user functions
Protecting administrative functions.
Protecting end-user functions
Protecting administrative functions
Parent topic:
Actions IKYSETUP performs by issuing RACF commands