Note | |
---|---|
If there is at least one |
To configure the client to trust the server's SAF certificate by using SAF validation only, perform the following tasks. Replace the names and IDs with those appropriate to your system:
Get the server host certificate and store it to a dataset,
for example 'SERVER1.CRT'
.
To add the server certificate into SAF, give the following TSO commands:
RACDCERT ID(USER) ADD('SERVER1.CRT') TRUST WITHLABEL('SERVER1') RACDCERT ID(USER) ADDRING(SSH-HOSTKEYS) RACDCERT ID(USER) CONNECT(ID(USER) LABEL('SERVER1') RING(SSH-HOSTKEYS) USAGE(PERSONAL)) RACDCERT ID(USER) LISTRING(SSH-HOSTKEYS)
For the settings to take effect, give the following TSO command:
SETROPTS RACLIST(DIGTCERT) REFRESH
Define the z/OS SAF external key provider that contains the
server host certificates in the general/known-hosts/key-store
element:
<known-hosts> ... <key-store type="zos-saf" init="KEYS(ID(USER) RING(SSH-HOSTKEYS))" /> </known-hosts>
For more information on the configuration file options, see ssh-broker-config(5). For information on the format of the external key initialization string, see the section called “Key Store Configuration Examples”.