Cryptographic Services

This section describes documents for Cryptographic Services, including ICSF, Open Cryptographic Services Facility, System Secure Sockets Layer (SSL) base, and PKI.

z/OS Cryptographic Services ICSF Administrator's Guide
Explains how to administer ICSF. It describes managing cryptographic keys, entering keys into the Cryptographic Key Data Set (CKDS) and using the key generator utility program (KGUP).
z/OS Cryptographic Services ICSF Writing PKCS #11 Applications
Describes the support for PKCS #11 provided by the z/OS Integrated Cryptographic Service Facility (ICSF). This document is primarily intended for application programmers who want to write PKCS #11 applications for z/OS.
z/OS Cryptographic Services ICSF Application Programmer's Guide
Describes the callable services provided by ICSF. It is helpful to application programmers using the security application programming interface (API) to access cryptographic functions.
z/OS Cryptographic Services ICSF Messages
Explains the ICSF messages and the routing and descriptor codes for those messages.
z/OS Cryptographic Services ICSF Overview
Introduces ICSF and provides information about the capabilities and benefits of using cryptographic services in a environment.
z/OS Cryptographic Services ICSF System Programmer's Guide
Explains how to initialize and customize ICSF. It also contains information and problem diagnosis information.
z/OS Cryptographic Services ICSF TKE Workstation User's Guide
Explains installing, implementing and administering the IBM Trusted Key Entry product. It is intended for anyone who manages cryptographic keys, usually a security administrator. It includes information to support the following tasks for the solution:
  • Planning
  • Installing
  • Administering
  • Customizing
  • Using
z/OS Cryptographic Services System SSL Programming
Contains guidance and reference information that an application programmer needs to use the System Secure Sockets Layer (SSL) callable services programming interfaces. SSL is a communications layer that provides data privacy and integrity as well as server and client authentication based on public-key certificates. The callable services programming interfaces provide protected communications over a TCP/IP socket communication path.
z/OS Cryptographic Services PKI Services Guide and Reference
Provides detailed procedures for planning, setting up, and using PKI Services. It also includes messages, log information, and coding samples.