XYGATE User Authentication Reference Manual
XYGATE
®
 User Authentication
™
 Reference Manual   
Chapter 19. XUA Auditing and Audit Reports 
XYPRO Technology Corporation  178  Proprietary and Confidential 
19.2  Checksums 
XUA performs CHECKSUMs on the UACONF and UAACL files for added security. 
The CHECKSUMs are written to the audit files each time the XUA SEEP is started 
when these configuration files are reloaded and whenever syntax checks are done on 
these files. 
The CHECKSUMs are unique for any given configuration of the files CHECKSUM’d, 
which permits the detection of changes to the files. 
19.3  XUA Audit Messages 
The amount of auditing done by XUA depends on the configuration of audits 
established in the individual UAGROUPs in the UAACL file. Refer to 
AUDIT_ACCESS_FAIL and AUDIT_ACCESS_PASS starting on page 258 in 
Appendix B: for more information. 
The XUA software can support up to nine auditing locations. When XUA is defined to 
write audit records to an ENSCRIBE disk file, reports can be generated using 
ENFORM. 
The following fields constitute the audit record format: 
02 date-time-data. 
03 year     PIC 9(4). 
03 FILLER    PIC X(1). 
03 month     PIC 9(2). 
03 FILLER    PIC X(1). 
03 day     PIC 9(2). 
03 FILLER    PIC X(1). 
03 hour     PIC 9(2). 
03 FILLER    PIC X(1). 
03 minute    PIC 9(2). 
03 FILLER    PIC X(1). 
03 second    PIC 9(2). 
03 filler    pic x(1). 
03 millisecond   pic 9(3). 
03 microsecond   pic 9(3). 
The time at which the object access request occurred, stored as: 
YYYY MM DD HH MM SS MMMMMM. 
02 SUBJECT-SYSTEM  PIC X(8). 
The node where the subject user is attempting to logon. The Subject system is 
blank if it is a local user. 
02 SUBJECT-GROUP-NUMBER PIC 9(3). 
The group number of the user making a logon request. 
02 SUBJECT-USER-NUMBER PIC 9(3). 
The user number of the user making a logon request. 










