Configure Cryptographic Settings
IBM® Controller components require a cryptographic provider to run. If you delete the default cryptographic provider, you must configure another provider to replace it. After configuring a cryptographic provider, you can test it on the gateway computer.
You can configure cryptographic and cryptographic provider settings, including the following:
- advanced algorithms
These include signing and digest algorithms.
- common symmetric key store (CSK) properties
The CSK is used by IBM Controller to encrypt and decrypt data.
- signing key store properties
The signing key pair includes the private key used to generate the digital signature and the public key used to confirm authenticity.
- encryption key store properties
The encryption key pair includes the private key used to encrypt data and the public key used to decrypt data.