Configure the Cryptographic Coprocessor

Configuring your Cryptographic Coprocessor allows you to begin to use all of its cryptographic operations.

The easiest and fastest way to configure your Cryptographic Coprocessor is to use the Cryptographic Coprocessor configuration web–based utility found off of the System Tasks page at http://server-name:2001 (specify another port if you have changed it from port 2001). The utility includes the Basic configuration wizard that is used for configuring (and initializing) a Coprocessor that has not been previously configured. If HTTP and SSL have not been previously configured, you will need to do the following before using the Configuration Wizard.

If the Cryptographic Coprocessor has already been configured, then click on the Manage configuration option to change the configuration for specific portions of the Coprocessor.

If you would prefer to write your own application to configure the Coprocessor, you can do so by using the Cryptographic_Facility_Control (CSUACFC), Access_Control_Initialize (CSUAACI), Master_Key_Process (CSNBMKP), and Key_Store_Initialize (CSNBKSI) API verbs. Many of the pages in this section include one or more program examples that show how to configure the Coprocessor via an application. Change these programs to suit your specific needs.

Whether you choose to use the Cryptographic Coprocessor configuration utility or write your own applications, the following outlines the steps you must take to properly configure your Cryptographic Coprocessor:

Related concepts
Configure the Cryptographic Coprocessor for use with DCM and SSL
Scenario: Write an i5/OS application to use the Cryptographic Coprocessor