ALERT: Some images may not load properly within the Knowledge Base Article. If you see a broken image, please right-click and select 'Open image in a new tab'. We apologize for this inconvenience.

The use of UCSK in R-ACCESS

book

Article ID: 143079

calendar_today

Updated On:

Products

Top Secret Top Secret - LDAP

Issue/Introduction

What is the meaning of the UCSK value in the Allowed  Access field?

Environment

Release : 16.0

Component : CA Top Secret for z/OS

Resolution

The UCSK is used because

TSSUTIL did not find a matching access level in the RDT for the access level bits specified on the request.

So it performs a test of bit settings:

X'60' - U update
X'10' - C create
X'08' - S scratch
X'04' - K control