Basic structure of a role
View a table that describes how the role data is structured.
| Offset | Length (bytes) | Description |
|---|---|---|
| 00 | 01 | Role structure major version number: X'01'. |
| 01 | 01 | Role structure minor version number: X'00'. |
| 02 | 02 | Role structure length (big endian). |
| 04 | 20 | Comment. A 20-character variable padded on the right with spaces, containing a comment which describes the role. This variable is not null (X'00') terminated. |
| 24 | 02 | Checksum (big endian). The checksum value is not used in the current role structure. It can be verified by the IBM® Cryptographic Coprocessor with a future version of the role structure. |
| 26 | 02 | Reserved (big endian): X'0000'. |
| 28 | 08 | Role ID. |
| 36 | 02 | Required authentication strength (big endian).
A 2-byte integer defining how secure the user authentication must be in order to authorize this role. |
| 38 | 02 | Lower time limit. The earliest time of day that this role can be used.
Format is
|
| 40 | 02 | Upper time limit. The latest time of day that this role can be used. Format is the same as lower time limit (offset 38). If the lower time limit and upper time limit are identical, the role is valid for use at any time of the day. |
| 42 | 01 | Valid days of week (DOW):
|
| 43 | 01 | Reserved (X'00') |
| 44 | variable | Access-control-point list (permitted or disallowed operations). The permitted operations are defined by the access control point list, described in Table 1. |