OSF DCE Application Development Guide--Core Components

Contents
Chapter 30. The Key Management API ................. 30-1
30.1 Retrieving a Key .................. 30-1
30.2 Changing a Key .................. 30-2
30.3 Automatic Key Management .............. 30-3
30.4 Deleting Expired Keys ................ 30-3
30.5 Deleting a Compromised Key .............. 30-3
Chapter 31. The Access Control List APIs ................ 31-1
31.1 The Client-Side API ................. 31-2
31.1.1 Binding to an ACL .............. 31-2
31.1.2 ACL Editors and Browsers ............ 31-3
31.1.3 Errors .................. 31-4
31.2 Guidelines for Constructing ACL Managers ......... 31-4
31.3 Extended Naming of Protected Objects ........... 31-5
31.3.1 The ACL Network Interface ............ 31-6
31.3.2 The ACL Library ............... 31-7
Chapter 32. The ID Map API .................... 32-1
Chapter 33. DCE Audit Service ................... 33-1
33.1 Features of the DCE Audit Service ............ 33-1
33.2 Components of the DCE Audit Service ........... 33-1
33.3 DCE Audit Service Concepts .............. 33-2
33.3.1 Audit Clients ................ 33-2
33.3.2 Code Point ................. 33-2
33.3.3 Events .................. 33-3
33.3.4 Event Class ................. 33-5
33.3.5 Event Class Number .............. 33-5
33.3.6 Filters .................. 33-5
33.3.7 Audit Records ................ 33-6
33.3.8 Audit Trail File ............... 33-7
33.4 Administration and Programming in DCE Audit ........ 33-7
33.4.1 Programmer Tasks ............... 33-7
33.4.2 Administrator Tasks .............. 33-9
Chapter 34. Using the Audit API Functions ............... 34-1
34.1 Adding Audit Capability to Distributed Applications ....... 34-1
34.1.1 Opening the Audit Trail ............. 34-2
34.1.2 Initializing the Audit Records ........... 34-2
34.1.3 Adding Event-Specific Information ......... 34-3
34.1.4 Committing an Audit Record ........... 34-4
34.1.5 Closing an Audit Trail File ............ 34-5
34.2 Writing Audit Trail Analysis and Examination Tools ....... 34-5
34.2.1 Opening an Audit Trail File for Reading ........ 34-6
34.2.2 Reading the Desired Audit Records into a Buffer ..... 34-6
34.2.3 Transforming the Audit Record into Readable Text ..... 34-7
34.2.4 Discarding the Audit Record ........... 34-8
34.2.5 Closing the Audit Trail File ............ 34-8
Chapter 35. The Password Management API ............... 35-1
124245 Tandem Computers Incorporated xv