Table of Contents

Search

  1. Preface
  2. Introduction to PowerExchange Utilities
  3. createdatamaps - Data Map Creation Utility
  4. DTLCCADW - Adabas PCAT Utility
  5. DTLCUIML - IMS Log Marker Utility
  6. DTLINFO - Release Information Utility
  7. DTLREXE - Remote Execution Utility
  8. DTLUAPPL - Restart Token Utility
  9. DTLUCBRG - Batch Registration Utility
  10. DTLUCDEP - CDEP Maintenance Utility
  11. DTLUCSR2 - IDMS SR2 and SR3 Records Utility
  12. DTLUCUDB - DB2 for Linux, UNIX, and Windows CDC Utility
  13. DTLULCAT and DTLULOGC - IDMS Log Catalog Utilities
  14. DTLURDMO - Data Map Utility
  15. DTLUTSK - Task Control Utility
  16. EDMLUCTR - Log Scan and Print Utility
  17. EDMXLUTL - Event Marker Utility
  18. HOSTENT - TCP/IP Address Reporter Utility
  19. PWXCATMY - MySQL Catalog Utility
  20. PWXUCCLPRT - Print Log Summary Utility
  21. PWXUCDCT - Logger for Linux, UNIX, and Windows Utility
  22. PWXUCREG - Capture Registration Suspend Utility
  23. PWXUCRGP - Capture Registrations Print Utility
  24. PWXUDMX - Data Maps Update Time ECSA Memory Utility
  25. PWXUGSK - SSL Reporting Utility for z/OS
  26. PWXUMAP - Map List Utility
  27. PWXUSSL - PowerExchange SSL Reporting Utility

PWXUGSK Utility Overview

PWXUGSK Utility Overview

Use the PWXUGSK utility to generate reports about SSL libraries and certificates that were generated on z/OS for the PowerExchange Listener. You can also determine the validity of certificates that are available to a specified user.
With the PWXUGSK utility, you can complete the following tasks:
  • Verify that a specified user ID has the authority to view security certificates for the PowerExchange Listener on z/OS, that the certificates are current and valid, and that the AT-TLS rules can intercept inbound requests, remove the TLS information and send TCP/IP packets to the listener.
  • Run a certificate report to view certificate information from a RACF keyring or SAF database.
  • Run a cipher report to view the cipher suites that are available on the z/OS system.
  • Run an error-code report to view all possible system SSL errors. After an SSL failure, particular instances of these errors can be found in the TCP/IP JES message log.

0 COMMENTS

We’d like to hear from you!