Federal Information Processing Standards support
FIPS mode enforces more restrictions than non-FIPS mode. For example, the key database must have been created in FIPS mode, and certain cipher suites are considered too weak for FIPS mode. For more information, see the following resources:
- "System SSL and FIPS 140-2" in the IBM publication z/OS Cryptographic Services System Secure Sockets Layer Programming
- The US Department of Commerce publication SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
For information about requesting FIPS mode encryption, see SERVER-statement.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*