Previous Topic: Generate Digital Certificates with CA Top Secret

Next Topic: Digital Certificates and IBM Security Server RACF

Add a Business Partner's Digital Certificate Using CA Top Secret

If you are running CA Top Secret at your site and you receive a digital certificate that was generated by a business partner using CA Top Secret, CA ACF2, or IBM Security Server RACF, use the following sample commands to define and add the certificate to the user task and CA Tape Encryption started task on your system.

If the remote security system is not using CA Top Secret, CA ACF2, or IBM Secure Server RACF, ensure the certificate is a DER encoded X.509 certificate that is in Base64 format (CERTB64).

Note: The sample commands in this example may vary at your site depending on your naming conventions and environment. Adjust the commands according to your site standards and environment.

To add a business partner's digital certificate using CA Top Secret

  1. Import the certificate into the CA Top Secret security file as shown in the following example:
    TSS ADD(USERA) DIGTCERT(BESCERT) DCDSN(BES.STARTED.TASK.CERT) TRUST
    

    The digital certificate from the business partner is imported into CA Top Secret.

  2. Create the KEYRING for a user task or started task ACID as shown in the following example. Skip this step if the user already has a KEYRING.
    TSS ADD(USERA) KEYRING(BESRING)
    

    The key ring is created.

  3. Attach the certificate to the user task or started task ACID KEYRING as shown in the following example:
    TSS ADD(USERA) KEYRING(BESRING) RINGDATA(CERTSITE,BESCERT)  USEAGE(PERSONAL)
    

    The certificate is connected to the key ring.

  4. Permit the user task or started task ACID to the SSL KEYRING, certificates, and mappings with the TSS PERMIT as shown in the following example:
    TSS PER(USERA) IBMFAC(IRR.DIGTCERT.GENCERT) ACC(UPDATE)
    TSS PER(USERA) IBMFAC(IRR.DIGTCERT.LISTRING) ACC(UPDATE)
    TSS PER(USERA) IBMFAC(IRR.DIGTCERT.LIST) ACC(UPDATE)
    

    Note: If the CA Encryption Key Manager is being used, CONTROL access is required to IRR.DIGTCERT.GENCERT and UPDATE access is required to IRR.DIGTCERT.LISTRING.

    The CA Tape Encryption started task's region ACID now has the appropriate permissions.

Note: For more information about the commands in the example, see the CA Top Secret Security for z/OS Cookbook.