Changing master keys
For security reasons your installation should change the master keys periodically. In addition, if the master keys have been cleared, you might want to change the master keys after you reenter the cleared master keys.
- Load the DES or AES master key parts into the new master key register.
- Reencipher the CKDS under the new DES or AES master key.
- Change the new DES or AES master key and activate the reenciphered CKDS.
In the first step, DES and AES master key parts can be loaded using TKE, or from ICSF panels. The second and third steps are performed using ICSF, or can be done using the Coordinated KDS Change Master Key utility (FMID HCR7790 or higher). For information about this utility, see z/OS Cryptographic Services ICSF Administrator's Guide.
- Disable PKA Services (required to load the RSA master key).
- Enter the RSA or ECC (APKA) master key parts into the new master key register.
- Reencipher the PKDS under the new RSA or ECC (APKA) master key.
- Change the new master keys and activate the reenciphered PKDS.
- Enable PKA Services.
- Enable Dynamic PKDS Access.
For EP11 host crypto modules, the P11 master keys protect the PKCS #11 token key data set (TKDS).
If multiple instances of ICSF share the same TKDS in a sysplex environment, the P11 master key must be set to the same value for each instance. All instances must be at FMID HCR77A0 or higher, even if they do not use secure PKCS #11 services. A TKE domain group can be used to manage the multiple domains of the ICSF instances so that all receive the same new P11 master key value.
- Load the P11 master key parts into the new master key register.
- Create a VSAM data set to hold the reenciphered keys.
- Do a coordinated TKDS master key change.
For step-by-step ICSF procedures for changing master keys, see z/OS Cryptographic Services ICSF Administrator's Guide.