Previous Topic: Specify a B2B Tape Using a Code Book

Next Topic: Command Protection Profiles

Data Sets Defined for Encryption and Decryption Processing

You must define each data set that you want to encrypt by altering the appropriate APPLDATA or $USERDATA field definition in your security system to indicate that the data set is a candidate for encryption. You also use this definition to define the type of encryption key to use. You must define a CA@BES data set selection or alter an existing profile for each data set to be encrypted using security system selection. The security system provides the necessary data set name masking for generic profiles.