Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Security features in an XRF environment z/OS Communications Server: SNA Network Implementation Guide SC27-3672-01 |
|
An XRF application program can establish cryptographic sessions and message authentication sessions with other LUs. Cryptography protects data passing over lines by permitting enciphering and deciphering of data for LU-LU sessions. Message authentication provides a message authentication code used to validate the contents of the data. The XRF application program must reside in a host that has the IBM® Integrated Cryptographic Service Facility/MVS (ICSF/MVS) or a compatible cryptographic product installed and active. The following references are used with compatible cryptographic
products::
Many PCF/CUSP compatible cryptographic products must be started before starting VTAM®. They also must be started before you activate an external CDRM or CP for which CROSS statements have been defined in the cryptographic key data sets. This is not necessary for the VTAM Integrated Cryptographic Service Facility. The XRF application program can specify that cryptography is either selective (specified by the session end) or required (session ends must support cryptography). To enable this facility, code the following statements:
|
Copyright IBM Corporation 1990, 2014
|