Important Updates to Cybersecurity Software
HelpSystems is updating the names of our cybersecurity software, including the Powertech product line. Don’t worry—the functionality of your products won’t change.
See the new names here > New, Clearer Names for HelpSystems Security Software.
Powertech Encryption for IBM i was previously called "Crypto Complete," and continues to be called "Cryptop Complete" in the software and accompanying documentation, including this article. Please review the following information before installing Powertech Encryption/Crypto Complete.
Crypto Complete requires that you enter a valid license key. Contact firstname.lastname@example.org if you need to request a new license key.
Note: A new license key format is introduced in version 3.58. The first update to this version will continue to work with the old key in place. However, the next update will require a key in the new format. Add the new key or verify this is in place using the Crypto menu: option 10, then option 1 for License Setup.
Crypto Complete 3.59 requires the following:
Please see APAR MA46940 on the IBM Support website for more details and PTF downloads.
It is Powertech’s goal not to change system values on customer systems because we recognize that security-conscious organizations have rigorous change control processes in place for even small changes to system values. Therefore, we ask you to make any system value changes that are needed. However, the Crypto Complete installation process could change a system value to allow the install to proceed if a system value is not set as specified below. If the Installation Wizard changes a system value during install, it changes it back to its original value when the install completes.
To install Powertech Crypto Complete on your system, the following system values that control object restores must be configured as shown.
The Crypto Complete software restores a library, CRYPTO, onto the IBM i. After the installation, the software (objects) will be contained in the library named CRYPTO.
Please read this section if you are updating from a prior release of Crypto Complete.
Warning: Before you update, make sure there are no Jobs Encrypting or Decrypting data.
New Product License Keys (when upgrading from a version prior to 3.0 or to a version after 3.58).
New product license key(s) are required when upgrading from a version prior to 3.0 or for the first update after the update to 3.58 or higher. Please contact HelpSystems at email@example.com to request new product license keys. Failure to do so will cause the product to stop functioning.
Check for Locks
Before upgrading, if you have CRYPTO in the System Library List, there will be many locks on the CRYPTO library. This is okay if you are using Crypto for native object encryption (files in libraries) only.
If you are using IFS Encryption, make sure there are no locks on the CRPFIFS, CRPFIFS2 and CRPFIFSLOG files in the CRYPTO library. If locks are present, wait until off-hours or a maintenance window to put the system in a restricted state before upgrading in order to release the locks and run the update.
Retention of User Data
Warning: You should not delete the existing Crypto Complete library, CRYPTO before upgrading, otherwise user-defined data in the library will be lost.
If you already have a permanent license key to Crypto Complete, this license key will be retained during the update. After version 3.58 a new license key format is used.
The following user-defined data will be retained through the Crypto Complete update:
During the installation process, a copy of the existing user-defined data will be saved into a library called CRYPTxxxxx, where xxxxx is a sequential number starting with 00001. This library will only be needed if an update fails, in which case you should contact HelpSystems.
Use the following steps to install/update Crypto Complete.
Ensure the following servers are available and running prior to installation or updating:
Stop any replication of the Crypto library prior to updating.
Do the following to perform the installation or update:
If you chose to stage your objects during step 5b of the installation or update process, do the following to manually load them on the IBM i you identified above.
The installed CRYPTO library (and the objects contained in the library) will initially provide authorities to the following users:
QPGMR: *ALL authority
*PUBLIC: *USE authority
If you would like to assign different authorities for the CRYPTO library and objects, then use the CHGOBJOWN, RVKOBJAUT and GRTOBJAUT commands to make those changes. It is highly recommended to not give *PUBLIC any additional authorities (beyond *USE) to the programs and commands in CRYPTO library.
After Crypto Complete has been installed, the next step is to add your license key to the product. Configuration of the product may then begin. Use the command Go CRYPTO/CRYPTO, take menu option 10 for Product Information, then 1 for License Setup.
Note: The Crypto Complete User Guide can be found at Powertech Product Manuals.
Still have questions? We can help. Submit a case to Technical Support.