The use of UCSK in R-ACCESS

book

Article ID: 143079

calendar_today

Updated On:

Products

CA Top Secret CA Top Secret - LDAP

Issue/Introduction

What is the meaning of the UCSK value in the Allowed  Access field?

Environment

Release : 16.0

Component : CA Top Secret for z/OS

Resolution

The UCSK is used because

TSSUTIL did not find a matching access level in the RDT for the access level bits specified on the request.

So it performs a test of bit settings:

X'60' - U update
X'10' - C create
X'08' - S scratch
X'04' - K control