Managing The Tps Audit Logs - Red Hat CERTIFICATE SYSTEM 8 - AGENTS GUIDE Agents Manual

Using web-based agent services
Table of Contents

Advertisement

Managing the TPS Audit Logs

Figure 9.16. Results for Searching Activities
The activities entries are formatted with two lines of information. The first line has the following
information:
• Activity ID, the unique ID of the activity entry
• Token, the ID of the token for which the activity was performed
• IP, the IP address of the client which connected to the TPS and performed the operation
• User ID, the ID of the person who performed the operation
• Operation, the kind of action being taken (a type of no_token means it is an administrative
operation)
• Result, the result returned for the operation
• Created, the time that the activity was performed
The second line contains a detailed description of what operation was performed.
9.4.4. Managing the TPS Audit Logs
Audit logs are special, protected logs that are used by auditors to track operations in the subsystem,
such as for routine security checks or in case of some kind of security breach. Audit logs record a
specific, configurable subset of operations.
131

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate system 8.0 - administration

Table of Contents