z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Usage Notes

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

The following table shows the access control points in the ICSF role that control the function of this service.

Table 93. Required access control points for Secure Key Import2
Key FormAccess control point
OPSecure Key Import2 – OP
IMSecure Key Import2 – IM

This table lists the required cryptographic hardware for each server type and describes restrictions for this callable service.

Table 94. Secure Key Import2 required hardware
ServerRequired cryptographic hardwareRestrictions
IBM eServer zSeries 900This service is not supported.
IBM eServer zSeries 990

IBM eServer zSeries 890

This service is not supported.
IBM System z9 EC

IBM System z9 BC

This service is not supported.
IBM System z10 EC

IBM System z10 BC

Crypto Express2 CoprocessorThis service is not supported.
Crypto Express3 CoprocessorThis service is not supported.
z196Crypto Express3 Coprocessor

HMAC key support requires the Nov. 2010 or later licensed internal code (LIC).

AES key support requires the Sep. 2011 or later licensed internal code (LIC).

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014