Controlling the use of hash and URL certificate encoding

To control the use of hash and URL certificate encoding, configure IP security policies to accept hash and URL encoded certificates by setting the CertificateURLLookupPreference parameter on the KeyExchangePolicy and KeyExchangeAction statements in the IP security policy configuration file of network security clients. For more details about the CertificateURLLookupPreference parameter on the KeyExchangePolicy and KeyExchangeAction statements, see z/OS Communications Server: IP Configuration Reference.