Cryptography commands
This table lists the specific authorities required for the cryptography commands.
Commands identified by (Q) are shipped with public authority *EXCLUDE. Commands shipped with public authority *EXCLUDE shows which IBM-supplied user profiles are authorized to the command. The security officer can grant *USE authority to others.
| Command | Referenced object | Authority needed | |
|---|---|---|---|
| For object | For library | ||
| ADDCKMKSFE | User file | *ADD, *OBJOPR, *READ | |
| User library | *EXECUTE | ||
| User directory | *X | ||
| User stream file | *R | ||
| ADDMSTPART (Q) 1 | |||
| CHKMSTKVV (Q) 1 | |||
| CLRMSTKEY (Q) 1 | |||
| CRTCKMKSF | User library | *ADD, *EXECUTE | |
| DSPCKMKSFE | User file | *OBJOPR, *READ | |
| User library | *EXECUTE | ||
| GENCKMKSFE | User file | *ADD, *OBJOPR, *READ | |
| User library | *EXECUTE | ||
| RMVCKMKSFE | User file | *DLT, *OBJOPR | |
| User library | *EXECUTE | ||
| SETMSTKEY (Q) 1 | |||
| TRNCKMKSF | User file | *OBJOPR, *READ, *UPD | |
| User library | *EXECUTE | ||
|
|||