Configuring Xdasv2 Roles - Novell XDASV2 - ADMINISTRATION GUIDE V1 Administration Manual

For edirectory, idm, and nmas
Table of Contents

Advertisement

Options
Account Management Events
Session Management Events
Data Item or Resource Element
Management Events
Service or Application Management
Events
Service or Application Utilization Events
Peer Association Management Events
Data Item or Resource Element Content
Access Events
Role Management Events
Exceptional Management Events
Authentication Management Events
Operational Events
For more information on events, see

3.4.2 Configuring XDASv2 Roles

Configure XDASv2 roles for the objects for which you want to collect XDASv2 events. You can
select object classes and set attributes for them.
16
Novell XDASv2 Administration Guide
Description
Select the account management events for which you
want to log events. You can log events to create, delete,
enable, disable, and query accounts, and also to modify
account security token.
Select the session management events for which you
want to log events. You can log events to create,
terminate, and modify sessions.
Select the data item or resource element management
events for which you want to log events. You can log
events to create and delete data items and to modify
and query data item attributes.
Select the service or application management events
for which you want to log events. You can log events for
enabling and disabling services.
Select the service or application utilization events for
which you want to log events. You can log events to
start and terminate services, and to modify process
contexts.
Select the peer association events for which you want to
log events. You can log events for creating and
terminating peer associations.
Select the data item or resource element content
access events for which you want to log events. You can
log events to create, terminate, and modify data item
associations.
Select the role management events for which you want
to log events. You can log events to create, delete,
query, and modify roles.
Select the exceptional management events for which
you want to log events. You can log events to start and
shut down systems and also to back up and recover
data stores.
Select the authentication management events for which
you want to log events. You can log events to
authenticate sessions and create access tokens.
Select the operational management events for which
you want to log events. You can log events to generate
eDirectory operation IDs.
Chapter A, "XDASv2 Events," on page
21.

Advertisement

Table of Contents
loading

Table of Contents