Products
Applications
Support
Company
How To Buy
Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
Register
Skip main navigation (Press Enter).
Toggle navigation
Search Options
Home
Communities
All Communities
Application Networking and Security
Enterprise Software
Mainframe Software
Software Defined Edge
Symantec Enterprise
Tanzu
VMware Cloud Foundation
Blogs
All Blogs
Enterprise Software
Mainframe Software
Symantec Enterprise
Events
All Events
Enterprise Software
Mainframe Software
Symantec Enterprise
VMware
Water Cooler
Betas
Flings
Education
Groups
Enterprise Software
Mainframe Software
Symantec Enterprise
ACF2
Mainframe Software
View Only
Community Home
Threads
Library
Events
Members
Back to discussions
Expand all
|
Collapse all
Implement Data Pervasive Encryption
1.
Implement Data Pervasive Encryption
0
Recommend
Broadcom Employee
Laura Fletcher
Posted Jan 04, 2022 03:13 PM
Reply
Reply Privately
Options Dropdown
As a security administrator, it's important to understand the requirements and options for implementing pervasive encryption. Typically, a user has read or write access to a data set.
Pervasive encryption
provides layers of security by requiring the user to have permission to use the key label (applied to **** data sets) and the z/OS Integrated Cryptographic Service Facility API (access to the key label). If the user lacks these security accesses, an error message is issued. For best practices and steps on how to implement pervasive encryption for a data set, see
Implement Data Pervasive Encryption with ACF2
.
------------------------------
Laura Fletcher
Staff Technical Writer
Broadcom
Illinois
------------------------------
×
New Best Answer
This thread already has a best answer. Would you like to mark this message as the new best answer?
Copyright 2019. All rights reserved.
Powered by Higher Logic