Implementing TLS Security in a PowerExchange Network

Implementing TLS Security in a PowerExchange Network

Implementation Task Flow

Implementation Task Flow

Before you begin TLS configuration for secure communication on a PowerExchange network, ensure that your organization has a local CA certificate from a well-known CA vendor. Optionally, you can generate a self-signed certificate for internal uses within your organization's network, such as for testing.
A security administrator typically performs the tasks to configure TLS. Security administrators have specific permissions and system access that allow them to generate and manage security certificates and policy files.
All certificates created for use with PowerExchange must be generated to the X.509 standard. For example, because the PKCS7 format meets the X.509 standard, it can be used to generate the certificates.
  1. Determine your organization's requirements for TLS connections.
  2. Configure each TLS server on z/OS.
  3. Configure each TLS server on Linux, UNIX, or Windows.
  4. If your organization requires client validation, configure each TLS client on Linux, UNIX, or Windows.
  5. Make the certificates available to the all PowerExchange servers and clients that require authentication.
  6. Verify that secure connections can be established between PowerExchange clients and servers.

0 COMMENTS

We’d like to hear from you!