Step 5: Authorizing IP security to Start of changeICSFEnd of change (optional)

IP security can take advantage of the encryption and decryption functions that are available on System z® hardware in the following ways:

This encryption support is provided by the combination of the Integrated Cryptographic Feature (ICRF) on the processor and the Integrated Cryptographic Service Facility/MVS™ (Start of changeICSFEnd of change) software product. ICSF provides cryptography support through various cryptographic hardware features. The cryptographic features that are available to your applications depends on your processor or server model. For information about which features are available on your hardware, see the information about callable service support by hardware configuration in z/OS Cryptographic Services ICSF Overview.

To use this support, Start of changeICSFEnd of change must be started and running. Preferably, start Start of changeICSFEnd of change prior to starting TCP/IP. However, it can also be started when TCP/IP is active. For details on configuring ICSF, see z/OS Cryptographic Services ICSF Administrator's Guide. ICSF provides SAF controls that you can optionally use to restrict access to these cryptographic services. To view a sample procedure for generating the corresponding SAF profiles for various CSFSERV services, see the Cryptographic Services Authorization section of the EZARACF sample in the SEZAINST data set.

Requirement: Start of changeIf you plan to control access to the ICSF cryptographic support, TCP/IP must be permitted to access the Start of changeICSFEnd of change cryptographic services (CSFSERV).End of change
Guideline: If you do not have any reason to restrict access to the ICSF cryptographic support, you should not activate the CSFSERV resource class, define any of the profiles listed below, or permit Start of changeusersEnd of change to these profiles. If you do need to set up controls in the CSFSERV resource class, complete the steps below to enable use of ICSF for IP security.