If you use software products that reference the passwords stored in the CA VM:Secure directory database or in the CP object directory, you might need to remove PEF. You might also need to remove PEF if your site plans to use DIAGNOSE X’84’.
Password decryption is possible only if you used the PENCRYPT REVERSE command to install reversible encryption. If you used the FORWARD or DES3 operands of PENCRYPT to install forward encryption, you cannot decrypt the passwords; you will have to manually change all directory passwords.
To remove PEF, you must generate a new CP nucleus and decrypt the encrypted passwords.
Important! These changes require you to shut down and re-IPL both CA VM:Secure and your VM system.
Note: To facilitate removal, PENCRYPT produces type‑able passwords instead of unprintable characters.
To remove PEF
For more information about how to do this, see Step 6: Configuring and Generating the CA VM:Secure CP Component.
If passwords are reversibly encrypted, take the following steps to decrypt them:
pencrypt decrypt
The PENCRYPT DECRYPT command creates a USER DIRECT file of your current directory. Every password in each directory entry is then decrypted and the CP object directory is updated accordingly. At the end of this procedure, CA VM:Secure is automatically shut down.
Note: For information about the PENCRYPT utility, see the Reference Guide.
Important! At this point no one can use passwords until you IPL with the CP nucleus that you created in Step 5.
If the passwords are forward or triple DES encrypted, take the following steps to change the passwords to plain text:
Important! At this point no one can use passwords until you IPL with the CP nucleus that you created in Step 5.
|
Copyright © 2014 CA.
All rights reserved.
|
|