Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

key should be stored for long-term use. A wrapped key generated on one member of a sysplex cannot be used on any other member of the sysplex, nor on any other LPAR. 3.7 Exploiters of CPACF protected keys The following products are expected to make use of protected keys: DB2/IMSTM Encryption Tool Java z/OS Encryption Facility The following products currently make use of CPACF clear key processing: DB2/IMS encryption tool DB2® built in encryption Comm Server: IPsec/IKE System SSL Kerberos DFDSS Volume encryption Java Encryption Facility 3.8 Summary In summary: