The use of UCSK in R-ACCESS
book
Article ID: 143079
calendar_today
Updated On:
Products
Top Secret
Top Secret - LDAP
Issue/Introduction
What is the meaning of the UCSK value in the Allowed Access field?
Environment
Release : 16.0
Component : CA Top Secret for z/OS
Resolution
The UCSK is used because
TSSUTIL did not find a matching access level in the RDT for the access level bits specified on the request.
So it performs a test of bit settings:
X'60' - U update
X'10' - C create
X'08' - S scratch
X'04' - K control
Feedback
thumb_up
Yes
thumb_down
No