Example configurations on z/OS
This section provides example configurations of policies and certificates for Advanced Message Security queuing scenarios on z/OSĀ®.
The examples cover the Advanced Message Security policies required, and
the digital certificates that must exist relative to users and key rings. The examples assume that
the users involved in the scenarios have been set up by following the instructions provided in Task 27: Grant users resource permissions
for Advanced Message Security .
Local queuing of integrity-protected messages on z/OS
This example details the Advanced Message Security policies and certificates needed to send and retrieve integrity-protected messages to and from a queue, local to the putting and getting applications.
Local queuing of privacy-protected messages on z/OS
This example details the Advanced Message Security policies and certificates needed to send and retrieve privacy-protected messages to and from a queue, local to the putting and getting applications. Privacy-protected messages are both signed and encrypted.
Remote queuing of integrity-protected messages on z/OS
This example details the Advanced Message Security policies and certificates needed to send and retrieve integrity-protected messages to and from queues managed by two different queue managers. The two queue managers can be running on the same z/OS system, or on different z/OS systems, or one queue manager can be on a distributed system running Advanced Message Security.
Remote queuing of privacy-protected messages on z/OS
This example details the Advanced Message Security policies and certificates needed to send and retrieve privacy-protected messages to and from queues managed by two different queue managers. The two queue managers can be running on the same z/OS system, or on different z/OS systems, or one queue manager can be on a distributed system running Advanced Message Security.
Parent topic: Advanced Message Security