Getting Started with IFS Encryption
To get started with IFS encryption, you need to first configure Powertech Encryption for IBM i’s Key Management settings.
Configure Settings and Keys
Use the commands (in the order listed) below to quickly configure Powertech Encryption for IBM i’s Automatic IFS Encryption:
Step 1 – Change system values and IFS object settings.
- QSCANFS set to *ROOTOPNUD.
- QSCANFSCTL set to *NONE.
-
Create Object Scanning for the directory set to *YES.
EXAMPLE:
CHGATR OBJ('/home/lynn') ATR(*CRTOBJSCAN) VALUE(*YES) -
Object Scanning set to *YES on the IFS File.
EXAMPLE:
CHGATR OBJ('/home/lynn/audit.trc') ATR(*SCAN) VALUE(*YES)Each file that is to be encrypted needs to have the attribute *CRTOBJSCAN set to *YES.
Step 2 – Call the ADDIFSEXTP (adds the Powertech Encryption Exit Point Programs) command. Find this command in the IFS Utility Menu
(GO CRYPTO/CRYPTO14). This command adds the Fortra integrated exit programs to the QIBM_QPWFS_FILE_SERV, QIBM_QP0L_SCAN_CLOSE and QIBM_QP0L_SCAN_OPEN exit points on the system.
Step 3 – Restart the QSERVER subsystem now or later.
After the exit programs have been added to the appropriate exit points, a pop-up window asks if you would like to restart the QSERVER subsystem now or later.
Later execution of ADDIFSEXTP will not prompt you to restart QSERVER. Once you add the Fortra integrated exit program, and QSERVER restarts the first time, you do not need to restart QSERVER again. See Remove IFS Exit Point Programs (RMVIFSEXTP).
Step 4 – Run the STRIFSENCJ command. This command will submit the IFS server job to batch. Find this command on the IFS Utility Menu
(GO CRYPTO/CRYPTO14).
This Job uses the CRYPTO Job Description shipped in the CRYPTO Library. Make any changes you want to this Job Description for your system before running the Command.
- CHGKEYPCY (Review and/or change the Key Policy settings. Prompt command with F4)
- WRKKEYOFR (Indicate which users can create and manage Keys)
- LODMSTKEY (Prepare a Master Encryption Key (MEK) by loading the passphrase parts)
- CRYPTO/SETMSTKEY (Generate (set) the MEK using the loaded passphrase parts)
See Getting Started in the Powertech Encryption for IBM i User Guide for additional details.
Step 5 – CRTKEYSTR (create a key store to contain the Data Encryption Keys (DEK))
Step 6 – CRTSYMKEY (create a Data Encryption Key (DEK) and save it into the Key Store)
Step 7 – Create an authorization list for determining who is authorized to decrypt.
Step 8 – WRKIFSENC (create an entry to set up which directory(s) to encrypt)
The documentation for these commands (and all other Powertech Encryption for IBM i commands) is contained within this Powertech Encryption for IBM i Manual. All Powertech Encryption for IBM i commands also have online help text which can be accessed with the F1 key when a command is prompted.