XYGATE Access Control Reference Manual
XYGATE
®
 Access Control Reference Manual 
Appendix E: XAC Host Macros 
XYPRO Technology Corporation  255  Proprietary and Confidential 
REPMAC 
Example: the copy of REPMAC 
?tacl macro 
#frame 
[#push 
 t_t1 
 t_t2 
] 
XAC_datetime_make 1 
== put date computed and time of 00:00 into t_t1 
#set t_t1 [XAC_dt_year4]-[XAC_dt_month]-[XAC_dt_day] 00:00 
XAC_datetime_make 1 
== put date computed and end time of 23:59 into t_t2 
#set t_t2 [XAC_dt_year4]-[XAC_dt_month]-[XAC_dt_day] 23:59 
== invoke XAC_audit_report macro with computed date range for first four params. 
[XAC_audit_report 
 [t_t1]     == from_date + from_time 
 [t_t2]     == to_date + to_time 
 *.*      == user 
 *       == login name 
 N       == display output 
 *       == terminal 
 *       == command 
 N       == violations flag 
 $VIK.XYGATEAC.audit  == auditlog 
 $s.#xac.report   == output 
 SESSION     == sortorder 
 0       == debug flag 
 *       == report title 
 *       == user input 
 *       == ip address 
 *       == custom columns 
 *       == custom sort 
 132      == custom width 
 59      == custom lines 
] 
#unframe 
The above is the copy of REPMAC and the following is an example of its usage. XAC 
users can simply change the argument on REPMAC to produce their own XAC report 
output. For example, changing AUDITLOG from $VIK.XYGATEAC.audit to 
$VIK.XYLOGS.XAC, changed the VIOLATION FLAG from N to Y, and changed the 
value of XAC_datetime_make from 1 to 0 to produce today’s failed XAC commands. 
(0 means zero-days before – today, 1 means one-day before, 2 means two-days 
before, and so on). After this change, run REPMAC as shown below. 
Example: 
$VIK XYGATEAC 79> REPMAC 
   FILE NAME     LEVEL READ RECORDS READ  POSITIONS 
$VIK.XYLOGS.XAC        1   158    1 
007,01,00750  BEGIN(09/04/13 - 21:12:11:68) END(09/04/13 - 21:12:12:14) 
  STRATEGY COST = 2 
** END-OF-ENFORM-RUN ** 
$VIK XYGATEAC 80> 










