Forcing use of hardware crypto cards for encryption
search cancel

Forcing use of hardware crypto cards for encryption

book

Article ID: 15632

calendar_today

Updated On:

Products

Datacom DATACOM - AD CIS COMMON SERVICES FOR Z/OS 90S SERVICES DATABASE MANAGEMENT SOLUTIONS FOR DB2 FOR Z/OS COMMON PRODUCT SERVICES COMPONENT Common Services CA ECOMETER SERVER COMPONENT FOC Easytrieve Report Generator for Common Services INFOCAI MAINTENANCE IPC UNICENTER JCLCHECK COMMON COMPONENT Mainframe VM Product Manager CHORUS SOFTWARE MANAGER CA ON DEMAND PORTAL CA Service Desk Manager - Unified Self Service PAM CLIENT FOR LINUX ON MAINFRAME MAINFRAME CONNECTOR FOR LINUX ON MAINFRAME GRAPHICAL MANAGEMENT INTERFACE WEB ADMINISTRATOR FOR TOP SECRET Xpertware

Issue/Introduction

CA Datacom/DB and CA Datacom/AD provide encryption of data in tables that are configured for it. This encryption is done at a basic level, using z10 (or later) hardware, and this functionality provides for a single encryption key that is used for an entire database catalog (CXX).



Can CA Datacom be configured to force all encryption processing to use the cryptographic cards and not the General Processor, so that this overhead is not included in licensing and usage calculations?

Environment

Release:
Component: DB

Resolution

CA Datacom performs encryption using the hardware on which the programs are run. No special actions are required, and how the hardware chooses to perform the encryption or decryption processing is not known to our programs.

Therefore, we have no direct control over the processing or where it is performed.

Additional Information

For more information about the use of encryption for CA Datacom/DB tables, please refer to the following:

For version 15.1, please see the CA DocOps webpage "Administrating > CA Datacom/DB Database and System Administration > Data Encryption"

For version 15.0, please see the CA DocOps webpage "Administrating > CA Datacom/DB Database and System Administration > Data Encryption"

For version 14.0, please see the CA Datacom/DB Database and System Administration Guide, in the section, "Introduction Data Encryption"

As always, please contact CA Technologies support for CA Datacom if you have further questions.