Customizing the SSL connection with the Z controller when using your certificates (SAF)
The management of security certificates is different between product versions. Depending on the z-centric agent version you are using, customize the SSL connection between the agent and Z controller by either using your SAF certificates or the default certificates.
Depending on the agent version that you are using:
- For an agent version 10.2.1, or later
- Customize the Z controller by using the SAF (System authorization facility) interface, the agent certificates and the configuration file. For more information, see Customizing the SSL connection between the agents and Z controller when using your certificates.
- For an agent version 10.2.0, or earlier
- You can either use default certificates or create your own. For more information, see Setting SSL-secure connections for communication using the default certificates.
Customizing the SSL connection between the agents and Z controller when using your certificates
To communicate, the IBM Z Workload Scheduler Agents (z-centric agents) and the Z controller use the HTTPS protocol. The communication process uses the certificates obtained by customizing the Z controller using the SAF (System authorization facility) interface. In addition to customizing those certificates, you need to customize the agent certificates and the configuration file. To enable SSL communication, perform the following steps.
Setting SSL-secure connections for communication using the default certificates
- EQQCERCL
- The security certificate for the client.
- EQQCERSR
- The security certificate for the server.
You can decide to use these default certificates or create your own. However, in a production environment, it is recommended that you customize SSL communication with your own certificates.
In both cases, you need to import them into your security system. If you are using RACF, you are provided with the EQQRCERT sample job that you can run to import the certificates. To run this job, ensure that you use the same user ID that RACF associates with the controller started task.
- Copies the EQQCERCL certificate to a temporary sequential data set
- Copies the EQQCERSR certificate to a temporary sequential data set
- Imports EQQCERCL to RACF
- Imports EQQCERSR to RACF
- Deletes the temporary sequential data sets
- Creates the SAF key ring that is used to connect the imported certificates
- Updates the RACF database with the new certificates and key ring