Securezip™ for Zseries (OS/390 and Z/OS)
Total Page:16
File Type:pdf, Size:1020Kb
SecureZIP™ for zSeries (OS/390 and z/OS) System Administrators Guide SZZSA-V8R1000 PKWARE Inc. PKWARE Inc. 9009 Springboro Pike Miamisburg, Ohio 45342 Sales: 937-847-2374 Support: 937-847-2687 Fax: 937-847-2375 Web Site: http://www.pkware.com Sales - E-Mail: [email protected] Support - http://www.pkware.com/support 8.1 Edition (2005) SecureZIP for zSeries™, PKZIP for zSeries™, PKZIP for MVS™, SecureZIP for iSeries™, PKZIP for iSeries™, PKZIP for OS/400™, PKZIP for VSE™, PKZIP for UNIX™, SecureZIP for Windows™, and PKZIP for Windows™ are just a few of the many members in the PKZIP® family. PKWARE Inc. would like to thank all the individuals and companies -- including our customers, resellers, distributors, and technology partners -- who have helped make PKZIP® the industry standard for Trusted ZIP solutions. PKZIP® enables our customers to efficiently and securely transmit and store information across systems of all sizes, ranging from desktops to mainframes. This edition applies to the following PKWARE Inc. licensed program: SecureZIP for zSeries™ (Version 8, Release 1, 2005) PKZIP(R) is a registered trademark of PKWARE(R) Inc. SecureZIP is a registered trademark of PKWARE(R) Inc. Other product names mentioned in this manual may be a trademark or registered trademarks of their respective companies and are hereby acknowledged. Any reference to licensed programs or other material, belonging to any company, is not intended to state or imply that such programs or material are available or may be used. The copyright in this work is owned by PKWARE Inc., and the document is issued in confidence for the purpose only for which it is supplied. It must not be reproduced in whole or in part or used for tendering purposes except under an agreement or with the consent in writing of PKWARE Inc., and then only on condition that this notice is included in any such reproduction. No information as to the contents or subject matter of this document or any part thereof either directly or indirectly arising there from shall be given or communicated in any manner whatsoever to a third party being an individual firm or company or any employee thereof without the prior consent in writing of PKWARE Inc. Copyright © 1989 - 2005 PKWARE Inc. All rights reserved. Contents PREFACE............................................................................................................. 1 Notices.........................................................................................................................1 About this Manual.......................................................................................................1 Conventions Used in this Manual .............................................................................1 Related Publications ..................................................................................................2 Related IBM Publications...........................................................................................2 Related Information on the Internet..........................................................................3 User Help and Contact Information ..........................................................................3 1 SYSTEM PLANNING AND ADMINISTRATION............................................. 4 Planning for Administration Activities .....................................................................5 SecureZIP Model Environments................................................................................7 Encryption .................................................................................................................7 Signing and Authentication .......................................................................................7 Security Concepts ......................................................................................................7 Encryption .................................................................................................................7 Signing and Authentication .......................................................................................8 Public Key Infrastructure and Digital Certificates......................................................8 Setting Up Stores for Digital Certificates on zOS ...................................................11 Types of Encryption Algorithms .............................................................................13 FIPS 46-3, Data Encryption Standard (DES)..........................................................13 Triple DES algorithm (3DES) ..................................................................................14 Advanced Encryption Standard (AES)....................................................................14 Comparison of the 3DES and AES Algorithms.......................................................14 RC4 .........................................................................................................................15 Standard..................................................................................................................15 Key Management ......................................................................................................16 Passwords and PINS................................................................................................16 Recipient-Based Encryption....................................................................................16 iii Integrity of Public and Private Keys .......................................................................17 Data Encryption ........................................................................................................17 2 INSTALLATION, LICENSING, AND CONFIGURATION............................. 19 Installation Overview................................................................................................19 Type of Media Distribution for Installation.............................................................19 Installation from Downloaded File or CD ...............................................................20 Non-SMP/E Installation...........................................................................................20 SMP/E Installation...................................................................................................22 Installing from 3490 Tape ........................................................................................26 Initializing the License .............................................................................................27 Evaluation Period....................................................................................................27 Release Licensing...................................................................................................27 Show System Information .......................................................................................27 Reporting the SecureZIP for zSeries License.........................................................28 Applying a License Key or Authorization Code.......................................................29 SecureZIP for zSeries Grace Period .......................................................................29 Running a Disaster Recovery Test .........................................................................29 Tailoring Site Specific Changes to the Defaults Module......................................30 Protecting Files with the SAFETYEX Module ........................................................31 SMS Dataclass Considerations...............................................................................31 Note for users of PKZIP for MVS and PKZIP for zSeries 5.6 .................................32 Considerations when Exporting Private Keys using RACDCERT ..........................32 Activating the ISPF Interface...................................................................................32 ISPF Main Menu ........................................................................................................33 Verifying the Installation..........................................................................................34 3 SECURITY ADMINISTRATION OVERVIEW ............................................... 35 Keywords, Phrases, and Acronyms Used..............................................................35 Accessing Certificates ............................................................................................36 Public Key Certificate..............................................................................................36 Private Key Certificates...........................................................................................37 Certificate Authority and Root Certificates..............................................................37 Configuration Profile................................................................................................37 Contents of the Configuration Profile......................................................................37 Data Base (DB) Profile (Local Certificate Store).....................................................38 LDAP Profile (Networked Certificate Store)............................................................38 Recipient Searches.................................................................................................39 Local Certificate Stores............................................................................................39 Access x.509 Public and Private Key Certificates ..................................................39