Managing keys using TKE and ICSF

Master keys are used to protect all cryptographic keys that are active on your system.

Because master key protection is essential to the security of the other keys, ICSF stores the master keys within the secure hardware of the cryptographic feature. This nonvolatile key storage area is unaffected by system power outages, because it has a battery backup. The values of the master keys never appear in the clear outside the cryptographic feature.

Requirements: ICSF is required to complete some operations initiated from TKE:

For more information about these ICSF procedures, see z/OS Cryptographic Services ICSF Administrator's Guide.

Attention: Be prepared to switch between your TKE workstation and your ICSF host session.
Note: Under normal circumstances, set master keys using ICSF services that coordinate setting the master key with initializing or re-enciphering key storage. Failure to do this can cause the keys or tokens in key storage to become unusable when accessed by ICSF. There are some exceptions.