Use the encryption key protection profiles to control access to keys, code books, and digital certificates. Encryption key protection can be defined by the individual key name, at the global or local level BES subsystem level (for example BES versus BESn) or through the PROTECT or PERMIT processing options.
Encryption key profiles are composed of three components that must be defined in this order: the BES or BESn subsystem, encryption key type, encryption key name.
Note: CA Tape Encryption supports the use of generic RACF profiles for key protection. You can define your encryption key profiles as generic or fully‑qualified as required.
The second node in the resource definition states the type of encryption key being protected. Valid encryption key definition types are:
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |