Configure Cryptographic Settings

IBM® Controller components require a cryptographic provider to run. If you delete the default cryptographic provider, you must configure another provider to replace it. After configuring a cryptographic provider, you can test it on the gateway computer.

You can configure cryptographic and cryptographic provider settings, including the following:

  • advanced algorithms

    These include signing and digest algorithms.

  • common symmetric key store (CSK) properties

    The CSK is used by IBM Controller to encrypt and decrypt data.

  • signing key store properties

    The signing key pair includes the private key used to generate the digital signature and the public key used to confirm authenticity.

  • encryption key store properties

    The encryption key pair includes the private key used to encrypt data and the public key used to decrypt data.