XYGATE User Authentication Reference Manual
XYGATE
®
User Authentication
™
Reference Manual
Contents
XYPRO Technology Corporation x Proprietary and Confidential
19.5.1 Audit File .............................................................183
19.5.2 Report date range ..................................................184
19.5.3 Subject Userid and/or Subject Login name .....................184
19.5.4 System ................................................................185
19.5.5 Terminal ..............................................................186
19.5.6 UA Group .............................................................186
19.5.7 Outcome..............................................................187
19.5.8 Result Type ..........................................................188
19.5.9 Production/Test results ............................................188
19.5.10 Comment .............................................................189
19.5.11 Delete Comments (Choose to Include Comments) .............189
19.5.12 Output File ...........................................................189
19.5.13 Sort Order ............................................................190
19.5.14 Target Userid and/or Target Login name........................190
19.5.15 Final Outcomes Only................................................191
19.5.16 IP Address ............................................................191
19.5.17 Exit the report macro ..............................................192
19.5.18 Run the audit report ................................................192
19.5.19 Run Report and Go Directly into PERUSE ........................193
19.6 XUA Report Formats ............................................................194
19.6.1 The Subject Report Format........................................194
19.6.2 The Target Report Format .........................................195
19.6.3 The Time Report Format ...........................................196
19.6.4 The Session Report Format ........................................198
19.6.5 The COUNTS Report Format .......................................199
19.6.6 The IP Report Format ..............................................200
19.6.7 Custom Reports .....................................................200
Appendix A: The UACONF File ...................................................................... 201
A1: The UACONF File Keywords ....................................................201
A2: Sample UACONF File ............................................................205
A3: AUDIT (Filename) ...............................................................206
A4: AUDIT (Process Name or Device) ..............................................207
A5: AUDIT (IP Process Name) .......................................................208
A6
: AUDIT_ACCESS_FAIL ............................................................210
A7: AUDIT_ACCESS_PASS ............................................................210
A8: AUDIT_SERVER ...................................................................210
A9: AUTHENTICATE_FAIL_FREEZE .................................................211
A10: AUTHENTICATE_FAIL_STOP ....................................................211
A11: AUTHENTICATE_FAIL_TIMEOUT ...............................................212