This document discusses how to migrate Digital Certificates in Top Secret across systems whose private key is stored in ICSF.
Migrating an ICSF private key from one system to another: Private keys generated by ICSF on behalf of CA Top Secret or stored into ICSF's PKA data set (PKDS) by CA Top Secret are always encrypted and cannot be recovered in clear text. Therefore, certificates with such keys cannot be exported from CA Top Secret in PKCS #12 format. In general, this restricts the ability to migrate certificates and their private keys from one system to another and share them among multiple systems.
However, a certificate and its ICSF private key can be migrated when both the source and target systems are z/OS systems configured to use ICSF and both share the same ICSF PKA master key. The systems need not share the same CA Top Secret database nor share the same ICSF PKDS.
Use the following steps to generate a new certificate with a private ICSF key on system A (the source system) and replicate the same certificate and key on system B (the target system). In the TSS GENCERT command examples shown, the certificate to be migrated is associated with the user ID SYSMAN and has the CA Top Secret certificate label 'SECURE.KEY'. The ICSF private key has the PKDS key label 'SECURE.KEY' and is generated by the PCI cryptographic coprocessor. On the target system, 'MIGRATED.KEY' will be the value used for the CA Top Secret certificate and PKDS key labels. (Note, they could have the same value as the source system if desired.)
Steps for migrating a certificate and its ICSF private key
Before beginning:
Steps for migrating a certificate and its ICSF private key in the PKDS
Perform the following steps to generate a CA Top Secret certificate and its ICSF public/private key pair on system A (the source system), and migrate them to system B (the target system).