3.3

Table Of Contents
3 Database Security
44
Recording Logins
Keep track of successful and attempted logins to preserve system security. You can spot
unauthorized users, people logging in at odd hours, or repeated attempts to guess passwords.
To monitor logins from different types of devices:
1. Change the value for the W_LOGTYPES token in the dictionary /site/dict/words. A
typical definition for this token might look like this:
W_LOGTYPES/G
Each letter in the W_LOGTYPES value represents a different type of device that can log
in on an iNEWS newsroom computer system.
The letters are the same ones that appear in the first column of a list s or list c display for
these device types.
2. To track logins by device type, add the appropriate letter to the W_LOGTYPES value.
Use the following letters:
For instance, to track logins from all devices on your system, change the
W_LOGTYPES line to look like this:
W_LOGTYPES/GBc
The letters can appear in any order.
n
On a busy system, this can create a large amount of console activity.
Letter Description
G iNEWS Workstation
g Web Client
B Web sessions
C Community sessions
cCOM
A Interplay (Instinct or NewsCutter)
aWeb Services API
I Instinct