Table of Contents

Search

  1. Preface
  2. Introduction to PowerExchange Utilities
  3. createdatamaps - Data Map Creation Utility
  4. DTLCCADW - Adabas PCAT Utility
  5. DTLCUIML - IMS Log Marker Utility
  6. DTLINFO - Release Information Utility
  7. DTLINFOX - Enhanced Release Information Utility
  8. DTLREXE - Remote Execution Utility
  9. DTLUAPPL - Restart Token Utility
  10. DTLUCBRG - Batch Registration Utility
  11. DTLUCDEP - CDEP Maintenance Utility
  12. DTLUCSR2 - IDMS SR2 and SR3 Records Utility
  13. DTLUCUDB - DB2 for Linux, UNIX, and Windows CDC Utility
  14. DTLULCAT and DTLULOGC - IDMS Log Catalog Utilities
  15. DTLURDMO - Data Map Utility
  16. DTLUTSK - Task Control Utility
  17. EDMLUCTR - Log Scan and Print Utility
  18. EDMUOPTS - Service Aid Utility
  19. EDMXLUTL - Event Marker Utility
  20. HOSTENT - TCP/IP Address Reporter Utility
  21. PWXCATMY - MySQL Catalog Utility
  22. PWXUCCLPRT - Print Log Summary Utility
  23. PWXUCDCT - Logger for Linux, UNIX, and Windows Utility
  24. PWXUCREG - Capture Registration Utility
  25. PWXUMAP - Map List Utility
  26. PWXUCRGP - Capture Registrations Print Utility
  27. PWXUDMX - Data Maps Update Time ECSA Memory Utility
  28. PWXUGSK - SSL Reporting Utility
  29. PWXUSSL - PowerExchange SSL Reporting Utility
  30. WRKJRNLCKE- Journal Lock Table Utility for IBM i

PWXUGSK Utility Overview

PWXUGSK Utility Overview

Use the PWXUGSK utility to generate reports about SSL libraries and certificates that were generated on z/OS or IBM i. You can also determine the validity of certificates that are available to a specified user.
With the PWXUGSK utility, you can complete the following tasks:
  • Verify that a specified user ID has the authority to view security certificates, that the certificates are current and valid, and that the AT-TLS rules can intercept inbound requests, remove the TLS information and send TCP/IP packets to the listener.
  • Run a certificate report to view certificate information from a RACF keyring, SAF data set, or certificate database.
  • Run a cipher report to view the cipher suites that are available.
  • Run an error-code report to view all possible system SSL errors.
  • Produce a formatted report of the z/OS AT-TLS rules.

0 COMMENTS

We’d like to hear from you!