You can easily control which services are used and which are not. ICSF 
calls RACF, see CSF* classes.

BTW: Why do you afraid? What's the risk you want to avoid?
Just curious.

--
Hello Radoslaw,

I had already set on the RACF audit bit for the CSF* classes and have 
successfully execute some ICSF API's and received audit records
in the CSFSERV class...this works fine. 

However I am also conducting tests with CA-XCOM (FTP) and switched on the ICSF 
interface in the XCOM config file, see XCOM documentation attachment, however 
this time I do not get any hits in the CSFSERV class. I expect to see some hits 
on the RACF profiles that cover ICSF CSNBSYE/CSNBSYD (CPACF) callable services.
  


 /pp/xcom/config/configssl.cnf                  

ÝICSF¨                                     
INITIATE_SIDE = CLEAR                      
RECEIVE_SIDE  = CLEAR                                                          

ÝCIPHER¨                                                    
INITIATE_SIDE = ALL:!AES:!ADH:!LOW:!EXP:MD5:@STRENGTH       
RECEIVE_SIDE  = ALL:!AES:!ADH:!LOW:!EXP:!MD5:@STRENGTH      

See also TSO ICSF Coprocessor Management   panel screen print attachment
                                                    
regards

Francis

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN
Chapter 2: Installation and Configuration Best Practices 23

Hardware Data Encryption Technology

If data encryption is desired for CA XCOM Data Transport transfers, this is 
most efficiently accomplished using the IBM Integrated Cryptographic Service 
Facility (ICSF). This facility uses a specialized processor and CPU 
instructions to perform data encryption and decryption using hardware. This 
stands in contrast to the software-based data encryption provided by OpenSSL. 
CA XCOM Data Transport supports both OpenSSL and ICSF as tools for encrypting 
data. Using hardware-based encryption and decryption is more efficient and 
reduces the amount of general processor resource required to perform secure 
data transmissions.

For hardware-based encryption, only 3DES is supported.

Several parameter changes must be made in the XCOM_CONFIG_SSL configuration 
file in order to activate hardware compression support.
Within the [ICSF] section of the XCOM_CONFIG_SSL data set, the following 
parameters need to be set:

INITIATE_SIDE=CLEAR | NO
Applies to cases when this XCOM is the client (local machine)
RECEIVE_SIDE=CLEAR | NO
Applies to cases when this XCOM is the server (remote machine).

The allowable values and associated functionality for these parameters are:
CLEAR  
Stores the symmetric keys in clear text in memory during the transfer and uses 
the ICSF CSNBSYE/CSNBSYD encryption functions.
NO (default)
Uses the OpenSSL software encryption routine.
You also need to disable AES encryption in the configuration data set, because 
it will always invoke OpenSSL encryption. Disabling AES encryption is also done 
in the XCOM_CONFIG_SSL file, using the ! character. The following example of 
keyword values will accomplish this:
[CIPHER]
INITIATE_SIDE = ALL:!AES:!ADH:!LOW:!EXP:MD5:@STRENGTH
RECEIVE_SIDE = ALL:!AES:!ADH:!LOW:!EXP:!MD5:@STRENGTH

Business Value:
Using less general processor resource translates to cost savings. It may 
directly result in reduced billable CPU usage or free up processor resources 
for other tasks within the system. Another possible benefit is to defer or 
eliminate the need to upgrade or add general processor capacity


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN
COPROCESSOR   SERIAL NUMBER     STATUS             AES   DES    ECC  RSA
-----------   -------------    ------              ---   ---   ---   ---
        G00   90008xx1          ACTIVE             U     A      U    A 
        G01   90008xx2          ACTIVE             U     A      U    A 
        G02   90008xx3          ACTIVE             U     A      U    A 
        G03   90008xx4          ACTIVE             U     A      U    A 
---------------------------------------------------------------------------------



----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to