Create digital certificates and key ring using RACF
Create the certificates and key ring for use with AT-TLS to secure communication between Tivoli Management Services on z/OS components.
Before you begin
Certificates are used for authentication. You can use RACF for handling certificates for secure
communications, as described in this topic.
Tip: You can also generate certificates
outside of z/OS according to your organization policy and then import the certificates to RACF or
Integrated Cryptographic Service Facility (ICSF).
For other security management products, refer to your product documentation for information about
handling certificates and key rings.
- Related information
-
- z/OS Security Server RACF Security Administrator's Guide: RACF and digital certificates. For a sample setup that uses RACF, see Scenario 1: Secure server with a certificate signed by a certificate authority and Scenario 2: Secure server with a locally signed certificate.
- z/OS Planning for Multilevel Security and the Common Criteria: Authentication via client digital certificates
About this task
When you set up your certificates and key ring, you perform the following actions:
- Generate the certificates.
- Create the key ring that will be used in the AT-TLS rules, and add the OMEGAMON started task
user ID as the owner.Note: For more information about authorizing the OMEGAMON started tasks, see (If needed) Define security authorization for OMEGAMON started tasks.
- Add the certificate chain to the created key ring: root, intermediate, personal certificates (certificates might vary depending on your company policies).
The following procedure provides example RACF commands to perform these actions. In the example,
ITMUSER is the z/OS user ID under which the OMEGAMON started tasks run, and
ITMkeyring is the name of the key ring.Note: The examples are intended as a guide;
you can organize your certificates differently, depending on the requirements of your
site.