Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support all types of keyrings used within the z/OS ecosystem. #1851

Open
JirkaAichler opened this issue Feb 14, 2023 · 11 comments
Open

Support all types of keyrings used within the z/OS ecosystem. #1851

JirkaAichler opened this issue Feb 14, 2023 · 11 comments
Assignees
Labels
architecture TSC Technical Steering Committee

Comments

@JirkaAichler
Copy link

Some customers are requesting support for different keyring types that are used in their mainframe security environments. They are interested primarily in the JCECCARACFKS keyring format.

What Zowe components support keyring? How difficult would be to implement it?

It should be simple to update Java-based applications:

@rudatp
Copy link

rudatp commented Mar 8, 2023

I'm upvoting this request. We have customers using hardware private keys in RACF/Top Secret (ICSF), and just for ZOWE they have to create soft keys and are not happy about it.

@Joe-Winchester
Copy link
Member

Some related ICSF details in zowe/zss#597.

@balhar-jakub
Copy link
Member

We have another customer that would benefit from the ICSF support.

@nkocsis
Copy link
Member

nkocsis commented Oct 5, 2023

@MarkAckert Mark, do you think that the Marist system could be setup to support this hardware (ICSF) ?

@MarkAckert
Copy link
Member

I believe we have CSFSERV configured on the Marist boxes with some access already in place; we can update user permissions on the box and stc permissions through ZWESECUR. Do we have a test case we can run to verify its working? And is this just an ESM configuration change to get this working, or is it paired with a code change?

@JirkaAichler
Copy link
Author

The best way to validate the configuration is by generating an ICSF key ring.

I could not find any good documentation. This is probably the best that I found:

https://www.ibm.com/docs/en/sklmfz/1.1.0?topic=certificates-example-using-jceracfks-jceccaracfks-keystore-zos

@rudatp
Copy link

rudatp commented Oct 6, 2023

We have a test installation with private keys in ICSF. Which build/version is needed? Mine is a bit outdated, but I can update it quickly and test it.

@nkocsis
Copy link
Member

nkocsis commented Oct 6, 2023

I'm not sure if we have the code ready for this "feature". I'll leave it up to others to reply @1000TurquoisePogs @achmelo @balhar-jakub

@1000TurquoisePogs
Copy link
Member

correct, the code is not ready for testing of zlux.
i would love to make the code available to @rudatp soon to know where to go next.

@balhar-jakub
Copy link
Member

balhar-jakub commented Nov 8, 2023

We have another customer looking for JCECCARACF keyring stored in the ICSF.

@balhar-jakub
Copy link
Member

The latest discussion on the topic during the ZAC call discussed that:

  • Sean Grady will reach out to his colleague who could have the environment
  • Joe Winchester will also sync on the environment available for testing the certificates.

@balhar-jakub balhar-jakub changed the title Support various keyring types Support all types of keyrings used within the z/OS ecosystem. Nov 21, 2023
@balhar-jakub balhar-jakub removed the 23pi3 label Jan 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
architecture TSC Technical Steering Committee
Projects
None yet
Development

No branches or pull requests

8 participants