Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Usage Notes z/OS Cryptographic Services ICSF Application Programmer's Guide SA22-7522-16 |
||||||||||||||||||||||||||||||||||||
There are access control points that control use of the format rule array keys and the type of transport keys that can be used. All of these access control points are enabled in the default role. PKA Key Translate - from CCA RSA to SCVISA Format
PKA Key Translate - from CCA RSA to SC ME Format PKA Key Translate - from CCA RSA to SC CRT Format PKA Key Translate - from source EXP KEK to target EXP KEK PKA Key Translate - from source IMP KEK to target EXP KEK PKA Key Translate - from source IMP KEK to target IMP KEK This service requires at least one of the following access control points to be enabled in the ICSF role.
These access control points must be enabled to allow the key type combination shown in this table.
This table lists the required cryptographic hardware for each server type and describes restrictions for this callable service.
|
Copyright IBM Corporation 1990, 2014
|