You must update your security system to provide the following permissions for BES and ICSF resources:
Note: For more information about these classes, see the IBM ICSF Administrator's Guide, the IBM Security Server RACF Security Administrator's Guide, the CA ACF2 for z/OS Administrator Guide, and the CA Top Secret for z/OS User Guide.
In addition, the following ICSF startup parameters should be defined if you choose to run ICSF or are required to run it:
Note: For more information about ICSF and Special Secure Mode, see SecureKeysOnly and Special Secure Mode.
Note: Additional security system updates are required if you plan to perform B2B processing or if you plan to use the security system to manage encryption or to protect CA Tape Encryption commands, keys or utilities. For more information about the security system updates required for B2B processing, see the chapter “Using Digital Certificates.” For more information about using the security system to manage encryption and resource protection see the chapter “Using Your Security System for Tape Encryption and Resource Protection.”
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |