XYGATE Access Control Reference Manual

XYGATE
®
Access Control Reference Manual
Chapter 7. XAC Auditing and Audit Reports
XYPRO Technology Corporation 67 Proprietary and Confidential
yyyy-mm-dd hh:mm XAC-O <sessionid> <system name> [ggg,uuu] <term> <ACACL-Command-
Entry> <sequence number> <output-text>
Examples:
2001-04-02 11:08:53.362360XAC-C 00134A6C0AFD \XYS7000 [222,233] $ZTNP2.#PT7N8Y1
FUP-255 XYPRO.LAUREN 000001license $system.xygateac.xygateac
2001-04-02 11:32:06.141432XAC-O 00134A6DEDFE \XYS7000 [222,233] $ZTNP2.#PT7N8Y3
CALC-TEST-AUDITOUTPUT XYPRO.LAUREN 000003 %000 %000 %000
%000 %000 %000 %323 %264 "......S4"
2001-04-02 11:10:48.781100 XAC-E 00134A6C10BD [000,000] $ZTNP2.#PT7N8Y1 TACL-255
000,000 000025Program ending
7.4 DDL Layout
The DDL describes the layout of the audit records. This information can be used to
write custom audit reports.
Invocation Audit Record
The invocation audit record contains information about the origin of the command,
such as who entered it, from which process, and what startup command was passed.
The time at which the command was started, stored as:
YYYY MM DD HH MM SS MMMMMM.
03 YEAR PIC 9(4).
03 MONTH PIC 9(2).
03 DAY PIC 9(2).
03 HOUR PIC 9(2).
03 MINUTE PIC 9(2).
03 SECOND PIC 9(2).
03 MILLISECOND PIC 9(3).
03 MICROSECOND PIC 9(3).
This field indicates that this is an XAC-I audit.
03 AUDIT-TYPE PIC X(5).
This field indicates whether the command executed or was rejected with an error, such
as a security error.
03 COMMAND-STATUS PIC X(1).
This field contains the session identifier for this XAC session. All audit records that are
generated for this XAC session will contain this identifier.
03 SESSION PIC X(12).
This field contains the node name of the NSK system where the user was
authenticated.
03 SYSTEM PIC X(8).