Key Store

Data Encryption Keys (DEK) are contained within Key Stores. You can create one or more Key Stores on the IBM i using Powertech Encryption for IBM i. For instance, one Key Store could be used to contain DEKs for protecting Order Entry data, and a second Key Store could be used to contain DEKs for protecting Payroll data.

A Key Store is created as a *VLDL (Validation List) object on the IBM i. You can control access to the Key Store *VLDL object using IBM i object security.