Cryptography commands

This table lists the specific authorities required for the cryptography commands.

Commands identified by (Q) are shipped with public authority *EXCLUDE. Commands shipped with public authority *EXCLUDE shows which IBM-supplied user profiles are authorized to the command. The security officer can grant *USE authority to others.

Command Referenced object Authority needed
For object For library
ADDCKMKSFE User file *ADD, *OBJOPR, *READ  
User library   *EXECUTE
User directory *X  
User stream file *R  
ADDMSTPART (Q) 1      
CHKMSTKVV (Q) 1      
CLRMSTKEY (Q) 1      
CRTCKMKSF User library   *ADD, *EXECUTE
DSPCKMKSFE User file *OBJOPR, *READ  
User library   *EXECUTE
GENCKMKSFE User file *ADD, *OBJOPR, *READ  
User library   *EXECUTE
RMVCKMKSFE User file *DLT, *OBJOPR  
User library   *EXECUTE
SETMSTKEY (Q) 1      
TRNCKMKSF User file *OBJOPR, *READ, *UPD  
User library   *EXECUTE
1
You must have *ALLOBJ and *SECADM special authorities to use this command.