Previous Topic: Digital Certificates and IBM Security Server RACF

Next Topic: Add a Business Partner's Digital Certificate Using IBM Security Server RACF

Generate Digital Certificates with IBM Security Server RACF

The following example shows how a business partner can set up CA Tape Encryption with self-signed digital certificates generated by IBM Security Server RACF and transmit them to the organization that will create the encrypted tape.

Note: The sample commands in this example may vary at your site depending on your naming conventions and environment. Adjust the commands according to your site standards and environment.

To generate a digital certificate with IBM Security Server RACF

  1. Generate the CA Tape Encryption digital certificate with the RACF RACDCERT GENCERT command as shown in the following example:
    RACDCERT ID(BES) GENCERT 
    SUBJECTSDN(CN('BES certificate') O('organization'))  
    SIZE(1024) WITHLABEL('BESCERT')
    

    In this example, BES is the CA Tape Encryption started task region user ID, and BESCERT is the digital certificate name in RACF.

    The digital certificate is generated.

  2. Create the CA Tape Encryption started task KEYRING with the RACDCERT ADDRING command as shown in the following example:
    RACDCERT ID(BES) ADDRING(BESRING)
    

    The key ring is created.

  3. Add the CA Tape Encryption started task's certificate to the CA Tape Encryption started task's KEYRING with the RACDCERT CONNECT command as shown in the following example:
    RACDCERT ID(BES) CONNECT(LABEL('BESCERT') RING(BESRING))
    

    The certificate is added to the key ring.

  4. Permit CA Tape Encryption started task's region to the KEYRING, certificates and mappings with the RACF PERMIT as shown in the following example:
    PERMIT IRR.DIGTCERT.GENCERT CLASS(FACILITY) -
    ID(BES) ACCESS(UPDATE)                
    PERMIT IRR.DIGTCERT.LISTRING CLASS(FACILITY) -
    ID(BES) ACCESS(UPDATE)               
    PERMIT IRR.DIGTCERT.LIST CLASS(FACILITY) -
    ID(BES) ACCESS(UPDATE)
    

    Note: If the CA Encryption Key Manager is being used, CONTROL access is required to IRR.DIGTCERT.GENCERT and UPDATE access is required to IRR.DIGTCERT.LISTRING.

    The CA Tape Encryption started task now has the appropriate permissions.

  5. Export the CA Tape Encryption started task's certificate public key to a data set with the RACF RACDCERT EXPORT command as shown in the following example:
    RACDCERT ID(BES) EXPORT(LABEL('BESCERT')) -
    DSN('BES.TAPEENCRYPTION.CERT') FORMAT(CERTDER)
    

    The RACDCERT EXPORT command creates an industry standard, transportable digital certificate.

    Note: The data set does not need to be formatted. It is automatically created and cataloged.

    The certificate is exported.

  6. Transfer the data set BES.TAPEENCRYPTION.CERT to the site that creates the tape, using FTP, email, or any normal means.

    The certificate is transferred.

Note: For more information about the commands in the example, see IBM's z/OS Security Server RACF Command Language Reference.