z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Usage Notes

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

SAF may be invoked to verify the caller is authorized to use this callable service, the key label, or internal secure key tokens that are stored in the CKDS.

This table lists the access control points in the ICSF default role that control the function for this service.

Table 66. Key Translate2 Access Control Points
Access Control pointFunction control
Key Translate2Allows the Key Translate2 service to be functional.
Key Translate2 - Allow use of REFORMATAllows a key token to be rewrapped using one key-encrypting key.
Key Translate2 - Allow wrapping method override keywordsAllows the wrapping method keywords WRAP-ECB or WRAP-ENH to be used when the default key-wrapping method setting does not match the keyword.

This table lists the required cryptographic hardware for each server type and describes restrictions for this callable service.

Table 67. Key Translate2 required hardware
ServerRequired cryptographic hardwareRestrictions
IBM eServer zSeries 900None.This service is not supported.
IBM eServer zSeries 990

IBM eServer zSeries 890

None.This service is not supported.
IBM System z9 EC

IBM System z9 BC

None.This service is not supported.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014