XYGATE Access Control Reference Manual
XYGATE
®
Access Control Reference Manual
Appendix E: XAC Host Macros
XYPRO Technology Corporation 255 Proprietary and Confidential
REPMAC
Example: the copy of REPMAC
?tacl macro
#frame
[#push
t_t1
t_t2
]
XAC_datetime_make 1
== put date computed and time of 00:00 into t_t1
#set t_t1 [XAC_dt_year4]-[XAC_dt_month]-[XAC_dt_day] 00:00
XAC_datetime_make 1
== put date computed and end time of 23:59 into t_t2
#set t_t2 [XAC_dt_year4]-[XAC_dt_month]-[XAC_dt_day] 23:59
== invoke XAC_audit_report macro with computed date range for first four params.
[XAC_audit_report
[t_t1] == from_date + from_time
[t_t2] == to_date + to_time
*.* == user
* == login name
N == display output
* == terminal
* == command
N == violations flag
$VIK.XYGATEAC.audit == auditlog
$s.#xac.report == output
SESSION == sortorder
0 == debug flag
* == report title
* == user input
* == ip address
* == custom columns
* == custom sort
132 == custom width
59 == custom lines
]
#unframe
The above is the copy of REPMAC and the following is an example of its usage. XAC
users can simply change the argument on REPMAC to produce their own XAC report
output. For example, changing AUDITLOG from $VIK.XYGATEAC.audit to
$VIK.XYLOGS.XAC, changed the VIOLATION FLAG from N to Y, and changed the
value of XAC_datetime_make from 1 to 0 to produce today’s failed XAC commands.
(0 means zero-days before – today, 1 means one-day before, 2 means two-days
before, and so on). After this change, run REPMAC as shown below.
Example:
$VIK XYGATEAC 79> REPMAC
FILE NAME LEVEL READ RECORDS READ POSITIONS
$VIK.XYLOGS.XAC 1 158 1
007,01,00750 BEGIN(09/04/13 - 21:12:11:68) END(09/04/13 - 21:12:12:14)
STRATEGY COST = 2
** END-OF-ENFORM-RUN **
$VIK XYGATEAC 80>