Secure communications with IZSME
The following topics include details about creating specific AT-TLS rules to achieve secure communication, as well as using RACF to create groups with different levels of authorization, as a way of implementing RBAC. The examples are intended as a guide; you can organize your AT-TLS rules differently, depending on the requirements of your site. For more information on using AT-TLS with z/OS, see these topics:
- Application Transparent Transport Layer Security (diagram illustrating how AT-TLS works)
- Application Transparent Transport Layer Security (AT-TLS) (discussion of AT-TLS and applications)
- Setting up AT-TLS
- Configuring and activating the policy agent (PAGENT)