For SDSF operation, the IBM SDSF Operation and Customization Guide says that users need access to JESSPOOL resource:
locnode.+MASTER+.SYSLOG.SYSTEM.sysname.
With Top Secret, the ACIDs need access to:
locnode.*BYPASS*.SYSLOG.SYSTEM.sysname.
The second qualifier in a JESSPOOL resource is the userid that owns the SYSOUT data being protected. With Top Secret, it is normally an acid name. Top Secret usually does not allow ACEEs to be created for undefined users.
+MASTER+ is undefined in RACF, but RACF does allow ACEEs to be created for undefined users. Top Secret makes a specific exception for userids starting with a '+' in a handful of FACILITYs, but Top Secret treats these as bypass users and uses a userid of *BYPASS* in the ACEE that is created.
When a JESSPOOL resource name is constructed, it uses the userid from the ACEE. The *BYPASS* ACEE will result in a JESSPOOL resource owned by *BYPASS*. You can use *BYPASS* in the PERMIT command, but Top Secret will interpret the '*'s as masking characters. For that reason, use +BYPASS+ in the PERMIT.
It's still a masking character, but there are fewer resource names that will match.
Changing the way Top Secret creates an ACEE in a situation where it is creating a bypass user to make the JESSPOOL resource name match like RACF would require a major design change.
It is recommended to adjust the PERMIT command to the Top Secret form.