Planning for the Cryptographic Coprocessor
This information is pertinent to those planning to install an IBM® Cryptographic Coprocessor in their system running the i5/OS operating system.
Before you install
It is important that you take ensure your system meets the requirements necessary for the Cryptographic Coprocessor, prior to installing it. These requirements include hardware and software prerequisites. Additionally, you need to ensure the secure access of your system's resources prior to installing a Cryptographic Coprocessor. Lastly, familiarize yourself with the object authorities that are required for the security APIs (SAPI). [link to related topics here]
- Requirements
- Secure access
- Object authorities required for SAPI
- Requirements
Your system must run the i5/OS operating system and must meet these requirements before you install and use any of the Cryptographic Coprocessors.- Secure access
Access control restricts the availability of system resources to only those users you have authorized to interact with the resources. The system allows you to control authorization of users to system resources.
Parent topic:
4764 and 4758 Cryptographic CoprocessorsRelated concepts
Scenario: Protecting private keys with cryptographic hardware