Cryptography commands
This table lists the specific authorities required for the cryptography commands.
Commands identified by (Q) are shipped with public authority *EXCLUDE. Commands shipped with public authority *EXCLUDE shows which IBM-supplied user profiles are authorized to the command. The security officer can grant *USE authority to others.
Command | Referenced object | Authority needed | |
---|---|---|---|
For object | For library | ||
ADDCKMKSFE | User file | *ADD, *OBJOPR, *READ | |
User library | *EXECUTE | ||
User directory | *X | ||
User stream file | *R | ||
ADDMSTPART (Q) 1 | |||
CHKMSTKVV (Q) 1 | |||
CLRMSTKEY (Q) 1 | |||
CRTCKMKSF | User library | *ADD, *EXECUTE | |
DSPCKMKSFE | User file | *OBJOPR, *READ | |
User library | *EXECUTE | ||
GENCKMKSFE | User file | *ADD, *OBJOPR, *READ | |
User library | *EXECUTE | ||
RMVCKMKSFE | User file | *DLT, *OBJOPR | |
User library | *EXECUTE | ||
SETMSTKEY (Q) 1 | |||
TRNCKMKSF | User file | *OBJOPR, *READ, *UPD | |
User library | *EXECUTE | ||
|