Operator commands for IBM Security Key Lifecycle Manager for z/OS 1.1

Learn how to centralize and automate the encryption key-management process

From the developerWorks archives

developerWorks security editors

Date archived: December 19, 2016 | First published: September 10, 2013

Learn how to implement operator commands to control IBM Security Key Lifecycle Manager (ISKLM) for z/OS® from the console of a mainframe. The goal is to centralize and automate the encryption key-management process, reduce the number of encryption keys, and consolidate encryption key management while facilitating compliance for regulatory standards that require strong hardware encryption.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Security
ArticleID=943466
ArticleTitle=Operator commands for IBM Security Key Lifecycle Manager for z/OS 1.1
publish-date=09102013