Real Time Information Director User Documentation
RTID Security and Auditing 
Hewlett-Packard Company  4  529618 - 002 
Event Date 
If you look back at the example above, you’ll notice that the header includes a date. This 
date indicates when the reported event occurred and is automatically recorded in the audit 
record as the event date. 
An audit record also includes the system time (on the NonStop Server) when the 
document was processed.   
Role 
The role signifies the relation of the agent to the consumer. In the example above, the 
agent claims to be the consumer’s personal physician. This information is recorded as 
part of the audit record. 
A security policy can refer to the role as a criterion for authorizing or denying access to 
data, or to verify that the relationship an agent claims to have with the consumer matches 
the relationship on record for that agent in the data store. 
Security: Who Can Do What 
The Security system is designed primarily to guarantee the rights of the consumer, 
including privacy. Those rights determine which agents have access to each consumer's 
data. 
Director Role in Security Implementation 
Although security requirements vary by industry and institution, most real-time solutions 
have at least the following security requirements: 
•  The necessity to ensure that a user is legitimate, i.e., not an imposter 
impersonating a known user. 
•  The necessity to restrict access to physical components of a system, such as 
workstations. 
•  The necessity to restrict access to system resources, such as communication ports, 
disk drives, or running processes. 
•  The necessity to restrict the types of transactions users can perform. For example, 
a user might be allowed to query, but not update, a data store. 
•  The necessity to make specific data accessible only to specific users. 










