z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Usage Notes

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

SAF may be invoked to verify the caller is authorized to use this callable service, the key label, or internal secure key tokens that are stored in the CKDS or PKDS.

The following table shows the access control points in the ICSF role that control the function of this service.

Table 113. Required access control points for Trusted Block Create
Rule array keywordAccess control point
INACTIVETrusted Block Create - Create Block in Inactive form
ACTIVATETrusted Block Create - Activate an Inactive Block

This table lists the required cryptographic hardware for each server type and describes restrictions for this callable service.

Table 114. Trusted Block Create required hardware
ServerRequired cryptographic hardwareRestrictions
IBM eServer zSeries 990

IBM eServer zSeries 890

This callable service is not supported.
IBM eServer zSeries 900This callable service is not supported.
IBM System z9 EC

IBM System z9 BC

Cryptographic Express2 Coprocessor

RSA key support with moduli within the range 2048-bit to 4096-bit requires the Nov. 2007 or later licensed internal code (LIC).

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014