IBM 2 Computer Hardware User Manual


 
CCA Release 2.54
Appendix G. Access-Control-Point Codes
The table in this appendix lists the CCA access-control commands (“control
points”). The role to which a user is assigned determines the commands available
to that user.
Important: By default, you should disable commands. Do not enable a command
unless you know why you are enabling it.
The table includes the following columns:
Offset The hexadecimal offset for the command; offsets between
X'0000' and X'FFFF' not listed in this table are reserved.
Command Name The name of the command required by the following verbs.
Verb Name The names of the verbs that require that command to be
enabled; for example, the Encipher (CSNBENC) verb will fail
without permission to use the Encipher command.
Entry The entry_point_name of the verb.
Usage Usage recommendations for the command. The
abbreviations in this column are explained at the bottom of
the page.
See the “Required Commands” section towards the end of each verb description for
access control guidance for each verb.
Copyright IBM Corp. 1997, 2005 G-1