z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Authorization

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

There are two key objects used by this service, the source key (the key to be wrapped) and the wrapping key.

  • To wrap a source key that is a public object, the caller must have SO (READ) authority or USER (READ) authority (any access).
  • To wrap a source key that is a private object, the caller must have USER (READ) authority (user access)
  • To use a wrapping key that is a public object, the caller must have SO (READ) authority or USER (READ) authority (any access).
  • To use a wrapping key that is a private object, the caller must have USER (READ) authority (user access).

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014