This document describes the steps that must be completed to activate Encryption for Entire Net-Work. It is organized in the following topics:
The following table lists the steps that must be completed to activate Encryption for Entire Net-Work on mainframe systems. Click on a step number for more information.
Step | Description |
---|---|
1 | Create or obtain certificates for encryption and authentication. |
2 | Make Entire Net-Work library changes. |
3 | Deploy the certificates you have obtained. |
4 | Create the text file used to ensure random encryption. |
5 | Verify the parameters in the SYSPARMS member. |
6 | Alter the Entire Net-Work startup JCL. |
7 | Add the SSL DRIVER and LINK statements to the Entire Net-Work startup JCL. |
8 | Alter the target definitions. |
Create or obtain the certificates you will need for encryption and authentication.
Various organizations, such as VeriSign, act as external certificate authorities for other companies and supply keys for authentication and encryption as requested by their clients. For Entire Net-Work, you can use an external certificate authority to provide your keys or, for testing only, you can use the open source SSL Toolkit, provided with Encryption for Entire Net-Work, to become your own certificate authority.
For more information about the open source SSL Toolkit, read Using the SSL Toolkit or make your own Certificates. See Making SSL Certificates and Keys for further information.
To use an external organization to obtain your certificates, contact them for more information.
Note:
The certificates must have EBCDIC encoding and a record
length of 251 bytes.
Define the following data sets. These data sets are required for Encryption for Entire Net-Work:
NETWRK.vrs.SAGSSL.CERTS, where vrs represents the version number of Encryption for Entire Net-Work.
This data set will store the certificates and keys provided
by the certificate authority. It must be defined with the following attributes:
DSORG=PO, RECFM=FB, LRECL=251
, and BLKSZ=6024
. It
should also be write and read-protected by your company's security subsystem,
ideally so only Entire Net-Work can access it.
NETWRK.vrs.SAGSSL.RANDOM, where vrs represents the version number of Encryption for Entire Net-Work.
This data set will store a text file that will be used to
ensure encryption occurs in a random manner. The data set must be defined with
the following attributes: DSORG=PO, RECFM=FB, LRECL=80
, and
BLKSZ=3120
.
Once you have created or obtained your certificates (Step 1), they must be deployed. When you obtain your certificates (regardless of whether you used an external certificate authority or the SSL Toolkit) you are supplied with the following files:
A public key certificate for your company or installation.
A private key for your company or installation.
A public key certificate for the certificate authority itself.
A password for decrypting the certificates (sometimes called a pem pass phrase).
These files must be deployed before they can be used. To deploy these files, copy them to the NETWRK.vrs.SAGSSL.CERTS data set defined in Step 2.
Notes:
-x'00'
. If
you use FTP to transfer the password file from a personal computer to the
mainframe, FTP may have converted the null to a space. If so, edit the file and
insert a null at the end of the password string.
In the NETWRK.vrs.SAGSSL.RANDOM data set, create a text file member that contains at least 14 random characters. The random characters in this file will be used by the encryption routines, thus ensuring that encryption itself occurs in a random manner.
The sample SYSPARMS member is stored in the Entire Net-Work TCP/IP Option source library. This member can be renamed, but if you do so, you must also alter the startup JCL references to it.
The following table describes the parameters listed in the sample SYSPARMS member and explains what values are expected for Encryption for Entire Net-Work.
Make the following changes to the Entire Net-Work startup JCL. (A sample startup JCL member called JCLNET is provided in the z/OS source library) .
Add the APS (Software AG internal software) load library to your library concatenation. In z/OS environments, this version of Encryption for Entire Net-Work requires that level 20 of APS 3.3.1 or higher to be used.
In z/OS, you would add this DD statement:
// DD DISP=SHR,DSN=APSvrs.MVSLD00
Add DD (z/OS) statements to the appropriate Entire Net-Work startup JCL. In z/OS, you would add these statements:
//APSLOG DD SYSOUT=* //APSTRCF DD SYSOUT=* //SYSPARM DD DISP=SHR,DSN=NETWRK.vrs.nnnnnnnnn(SYSPARMS) //NETPC DD DISP=SHR,DSN=NETWRK.vrs.SAGSSL.CERTS(public-key-certificate-member) //NETPK DD DISP=SHR,DSN=NETWRK.vrs.SAGSSL.CERTS(private-key-member) //NETCAF DD DISP=SHR,DSN=NETWRK.vrs.SAGSSL.CERTS(CA-certification-member) //NETPSW DD DISP=SHR,DSN=NETWRK.vrs.SAGSSL.CERTS(pem-passphrase-member) //NETRND DD DISP=SHR,DSN=NETWRK.vrs.SAGSSL.RANDOM(random-member)
The following table describes the symbolic names and the data set names and member names expected for each.
Symbolic Name | References |
---|---|
APSLOG | The SYSOUT specification for APS (Software AG internal library) logs. |
APSTRCF | The SYSOUT specification for APS (Software AG internal library) traces. |
SYSPARM | The SYSPARMS member in the source library for Entire Net-Work. The values in supplied in this sample member SYSPARMS were maintained in Step 5. |
NETPC | A data set containing your
company's public key
and the signature of the certificate
authority
. This is the
NETWRK.vrs.SAGSSL.CERTS
data set defined in
Step 2. Your company's public key file
was deployed into this data set in Step
3 of these instructions.
This JCL statement is required if the SSL DRIVER statement is specified. |
NETPK | A data set containing your
company's private key
. This is the
NETWRK.vrs.SAGSSL.CERTS
data set defined in
Step 2. Your company's private key file
was deployed into this data set in Step
3.
This JCL statement is required if the SSL DRIVER statement is specified. |
NETPSW | A single sequential data set or a
member of a partitioned data set containing the password (pem pass
phrase
) required to decrypt the private key
referenced by the NETPK JCL statement. The sequential or partitioned data set
should be write and read-protected by your company's security subsystem,
ideally so only Entire Net-Work can access it. The password specified must be
null-terminated. Leading, embedded, and trailing blanks up to the null are
treated as part of the password.
This JCL statement is required if the SSL DRIVER statement is specified. |
NETRND | The random file member you created in Step 4. This file is stored in the NETWRK.vrs.SAGSSL.RANDOM data set defined in Step 2 or it can be stored in the same data set used for //NETPC, //NETPK, //NETCAF, and //NETPSW. |
Add an SSL/SSLI DRIVER and LINK statements in the Entire Net-Work startup job. For complete information on the SSL/SSLI DRIVER statements and parameters, read SSL/SSLI DRIVER Statement, elsewhere in this guide. For complete information on the SSL/SSLI LINK statement and its parameters, read SSL/SSLI LINK Statement, elsewhere in this guide.
To use Encryption for Entire Net-Work, the existing target definitions for your Adabas databases (on mainframe and open systems) must be updated to support secured communications. Each definition must be altered so that the protocol type "SSL" or "SSLI" is specified in the access or connection definition and appropriate security parameters are specified. For more information on maintaining your target entries and on the security parameters, read Access and Connection Definition Setup.
The following table lists the steps that must be completed to activate Encryption for Entire Net-Work on open systems. Click on a step number for more information.
Step | Description |
---|---|
1 | Create or obtain certificates for encryption and authentication. |
2 | Deploy the certificates you have obtained. |
3 | Create the text file used to ensure random encryption (optional). |
4 | Alter the target definitions. |
Create or obtain the certificates you will need for encryption and authentication.
Various organizations, such as VeriSign, act as external certificate authorities for other companies and supply keys for authentication and encryption as requested by their clients. For Entire Net-Work, you can use an external certificate authority to provide your keys or, for testing only, you can use the open source SSL Toolkit, provided with Encryption for Entire Net-Work, to become your own certificate authority.
For more information about the open source SSL Toolkit, read Using the SSL Toolkit.
To use an external organization to obtain your certificates, contact them for more information.
Once you have created or obtained your certificates (Step 1), they must be deployed. When you obtain your certificates (regardless of whether you used an external certificate authority or the SSL Toolkit) you are supplied with the following files:
A public key certificate for your company or installation.
A private key for your company or installation.
A public key certificate for the certificate authority itself.
A password for decrypting the certificates (sometimes called a pem pass phrase).
These files must be deployed before they can be used. To deploy these files:
Transport the certificates and key files to the systems where they are to be used. You can use the ftp utility to do this. You can also copy and rename certificates and key files as required.
Make sure the location of the certificates and keys is clear on the systems where they are being used. If they are not in the current directory, identify their location using the appropriate SSL parameters and settings as described in Access and Connection Definition Setup.
Optionally, create a text file member that contains at least 14 random characters. The random characters in this file will be used by the encryption routines, thus ensuring that encryption itself occurs in a random manner.
Note:
A random file is not required in Windows environments, but is
in some UNIX environments.
Make sure the location of the random file is clear on the systems where it is being used. If it is not in the current directory, identify its location using the appropriate RANDOM_FILE parameter as described in Access and Connection Definition Setup.
To use Encryption for Entire Net-Work, the existing target definitions for your Adabas databases (on mainframe and open systems) must be updated to support secured communications. Each definition must be altered so that the protocol type "SSL" is specified in the access or connection definition and appropriate security parameters are specified. For more information on maintaining your target entries and on the security parameters, read Access and Connection Definition Setup.