XYGATE User Authentication Reference Manual

XYGATE
®
User Authentication
Reference Manual
Chapter 19. XUA Auditing and Audit Reports
XYPRO Technology Corporation 178 Proprietary and Confidential
19.2 Checksums
XUA performs CHECKSUMs on the UACONF and UAACL files for added security.
The CHECKSUMs are written to the audit files each time the XUA SEEP is started
when these configuration files are reloaded and whenever syntax checks are done on
these files.
The CHECKSUMs are unique for any given configuration of the files CHECKSUM’d,
which permits the detection of changes to the files.
19.3 XUA Audit Messages
The amount of auditing done by XUA depends on the configuration of audits
established in the individual UAGROUPs in the UAACL file. Refer to
AUDIT_ACCESS_FAIL and AUDIT_ACCESS_PASS starting on page 258 in
Appendix B: for more information.
The XUA software can support up to nine auditing locations. When XUA is defined to
write audit records to an ENSCRIBE disk file, reports can be generated using
ENFORM.
The following fields constitute the audit record format:
02 date-time-data.
03 year PIC 9(4).
03 FILLER PIC X(1).
03 month PIC 9(2).
03 FILLER PIC X(1).
03 day PIC 9(2).
03 FILLER PIC X(1).
03 hour PIC 9(2).
03 FILLER PIC X(1).
03 minute PIC 9(2).
03 FILLER PIC X(1).
03 second PIC 9(2).
03 filler pic x(1).
03 millisecond pic 9(3).
03 microsecond pic 9(3).
The time at which the object access request occurred, stored as:
YYYY MM DD HH MM SS MMMMMM.
02 SUBJECT-SYSTEM PIC X(8).
The node where the subject user is attempting to logon. The Subject system is
blank if it is a local user.
02 SUBJECT-GROUP-NUMBER PIC 9(3).
The group number of the user making a logon request.
02 SUBJECT-USER-NUMBER PIC 9(3).
The user number of the user making a logon request.