The following example shows how a business partner can set up CA Tape Encryption with self-signed digital certificates generated by CA Top Secret and transmit them to the organization that will create the encrypted tape.
Note: The sample commands in this example may vary at your site depending on your naming conventions and environment. Adjust the commands according to your site standards and environment.
To generate a digital certificate with CA Top Secret
TSS GENCERT(BES) DIGICERT(BESCERT) -
SUBJECTN('o="COMPANYA" CN="BES certificate" -
OU="SYSTEMS" C="US" ')
In this example, BES is the CA Tape Encryption started task region accessor ID (ACID) and BESCERT is the digital certificate name in CA Top Secret.
The CA Tape Encryption digital certificate is generated.
TSS ADD(BES) KEYRING(BESRING) LABLRING(BESRING)
Note: There are no blank spaces in the LABLRING portion of the command.
The CA Tape Encryption started task KEYRING is created.
TSS ADD(BES) KEYRING(BESRING) RINGDATA(BES, BESCERT) - USAGE(PERSONAL)
The CA Tape Encryption started task's certificate is added to the key ring.
TSS PER(BES) IBMFAC(IRR.DIGTCERT.GENCERT) ACC(UPDATE) TSS PER(BES) IBMFAC(IRR.DIGTCERT.LISTRING) ACC(UPDATE) TSS PER(BES) IBMFAC(IRR.DIGTCERT.LIST) ACC(UPDATE)
Note: If the CA Encryption Key Manager is being used, CONTROL access is required to IRR.DIGTCERT.GENCERT and UPDATE access is required to IRR.DIGTCERT.LISTRING.
The CA Tape Encryption started task's region ACID now has the appropriate permissions.
TSS EXPORT(BES) DIGTCERT(BESCERT) DCDSN('BES.STARTED.TASK.CERT')
The TSS EXPORT command creates an industry standard, transportable digital certificate.
Note: The data set does not need to be formatted. It is automatically created and cataloged.
The certificate is exported.
The certificate is transferred.
Note: For more information about the commands in the example, see the CA Top Secret Security for z/OS Cookbook.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |