Z/OS: Trusted Key Entry Workstation (tke)


parts from the Datakey TKE smart card to be used on TKE 7.0 or later. Use the


Download 466.85 Kb.
Pdf ko'rish
bet11/34
Sana14.02.2023
Hajmi466.85 Kb.
#1197016
1   ...   7   8   9   10   11   12   13   14   ...   34
Bog'liq
TKE


parts from the Datakey TKE smart card to be used on TKE 7.0 or later. Use the Copy Smart Card option in
the Smart Card pull-down menu to copy keys and key parts from one TKE smart card to another. The
Smart Card pull-down menu is displayed only when smart card readers are enabled under the File pull-
down menu.
Host cryptographic modules managed by TKE
TKE manages host cryptographic modules on any CEC where that particular host cryptographic module is
supported. In other words, for example, TKE is unaware whether a CEX3C module is running on an IBM
System z10, IBM zEnterprise 196, IBM zEnterprise 114, IBM zEnterprise EC12, IBM zEnterprise BC12,
IBM z13, IBM z13s, IBM z14, or IBM z15.
Table 1 identifies the host cryptographic modules that each TKE release can manage.
Chapter 2. Requirements for TKE 11


Table 7. Host cryptographic modules managed by TKE LIC
TKE release
(LIC)
Host cryptographic modules supported by TKE release
CEX2C
CEX3C
CEX4C
CEX4P
CEX5C
CEX5P
CEX6C
CEX6P
TKE 5.2
Yes
No
No
No
No
No
No
No
TKE 5.3
Yes
Yes
No
No
No
No
No
No
TKE 6.0
Yes
Yes
Sometimes*
No
No
No
No
No
TKE 7.0
Yes
Yes
Sometimes*
No
No
No
No
No
TKE 7.1
Yes
Yes
Sometimes*
No
No
No
No
No
TKE 7.2
Yes
Yes
Yes
Yes#
No
No
No
No
TKE 7.3
Yes
Yes
Yes
Yes#
No
No
No
No

Download 466.85 Kb.

Do'stlaringiz bilan baham:
1   ...   7   8   9   10   11   12   13   14   ...   34




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling