Configuring the Cryptographic Coprocessor

 

Configuring your Cryptographic Coprocessor allows you to begin to use all of its cryptographic operations. To configure the Cryptographic Coprocessor on your system running the i5/OS operating system, you can either use the Cryptographic Coprocessor configuration web–based utility or write your own application.

The easiest and fastest way to configure your Cryptographic Coprocessor is to use the Cryptographic Coprocessor configuration web–based utility found off of the System Tasks page at http://server-name:2001 (specify another port if you have changed it from port 2001). The utility includes the Basic configuration wizard that is used for configuring (and initializing) a Coprocessor that has not been previously configured. If HTTP and SSL have not been previously configured, you will need to do the following before using the Configuration Wizard.

If the Cryptographic Coprocessor has already been configured, then click on the Manage configuration option to change the configuration for specific portions of the Coprocessor.

If you would prefer to write your own application to configure the Coprocessor, you can do so by using the Cryptographic_Facility_Control (CSUACFC), Access_Control_Initialize (CSUAACI), Master_Key_Process (CSNBMKP), and Key_Store_Initialize (CSNBKSI) API verbs. Many of the pages in this section include one or more program examples that show how to configure the Coprocessor via an application. Change these programs to suit your specific needs.

Whether you choose to use the Cryptographic Coprocessor configuration utility or write your own applications, the following outlines the steps take to properly configure your Cryptographic Coprocessor:

 

Parent topic:

4764 and 4758 Cryptographic Coprocessors

Related concepts
Scenario: Protecting private keys with cryptographic hardware Configuring the Cryptographic Coprocessor for use with DCM and SSL Scenario: Writing an i5/OS application to use the Cryptographic Coprocessor