Ward, Mike S wrote:
Is there a best practices redbook for the cards?
I don't remain any.
However cyrpto cards are usually described in chapters of "New shining
xxxx CPC Technical Introduction" redbooks.
BTW: What do you mean by "best practices"
IMHO best practice is to get what is needed, enable features via SE,
implement ICSF and use it.
Oh, do not even think about touching the hardware! You destroy it by
opening the card. That's for security reasons of key remaining in card
storage.
Best practices for ICSF, especially in multiple host environment and/or
DR planning - this should be carefully considered.
HTH
--
Radoslaw Skorupka
Lodz, Poland
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html