z/OS Cryptographic Services ICSF Administrator's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Understanding Cryptographic Keys

z/OS Cryptographic Services ICSF Administrator's Guide
SA22-7521-17

To understand cryptographic keys, you need to know the types of keys that exist and how ICSF protects them and controls their use. The Integrated Cryptographic Service Facility uses a hierarchical key management approach. A master key protects all the keys that are active on your system. Other types of keys protect keys that are transported out of the system. This topic gives you an understanding of how ICSF organizes and protects keys.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014