Previous Topic: Sample Scenario for Restricting Global Access to Keys and Permitting a Specific Key

Next Topic: Define Utility Resource Protection Scope and Level

Utility Protection Resource Protection Profiles

Use utility protection profiles with IBM Security Server RACF to control access to the utilities TBEKMUTL and TBESHOW.