Operator commands for IBM Security Key Lifecycle Manager for z/OS 1.1
Learn how to centralize and automate the encryption key-management process
From the developerWorks archives
Date archived: December 19, 2016 | First published: September 10, 2013
Learn how to implement operator commands to control IBM Security Key Lifecycle Manager (ISKLM) for z/OS® from the console of a mainframe. The goal is to centralize and automate the encryption key-management process, reduce the number of encryption keys, and consolidate encryption key management while facilitating compliance for regulatory standards that require strong hardware encryption.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.