Hp Secure Key Manager Uživatelský manuál Strana 253

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 352
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 252
Activity Log
The Activity Log contains a record of each request received by the KMS Server. For client requests
that contain multiple cryptographic operations, each operation is logged as a separate entry in the
Activity Log. Requests for cryptographic operations are not logged until the KMS Server has received
all the data from the client or an error has occurred. When there is no data for a particular field, a
dash is inserted. The format of the Activity Log is as follows:
<date> <priority> <ip> <common name> <user> <request id> <request type> <key> <detail> <error
code> <message>
The following table describes the fields that are present in the Activity Log.
Table 127 Fields in the Activity Log
DescriptionField
enclosed in brackets ( [] ), the date field shows the date and time that the SKM finished
processing the request, specified in the local time zone. The date and time are repres-
ented as follows: yyyy-mm-dd hh:mm:ss.
date
ERROR or INFO, depending on the result of the requestpriority
IP address of the client machineip
enclosed in brackets ( [] ), the common name field displays the common name defined
in the certificate that was provided by the client. This field only has data when you re-
quire client authentication.
common name
authenticated user that issued the requestuser
request ID of the client requestrequest id
type of client request; the request type field is the name of the XML request without the
suffix Request. For example, a KeyGenRequest log entry would have a request type
value of KeyGen.
request type
name of the key specified in the requestkey
enclosed in brackets ( [] ), the detail field provides different information based on the
type of request; the details field is described in Table 128.
detail
numerical error code returned to the clienterror code
enclosed in brackets ( [] ), the message field displays either Success if the server was
able to fulfill the request, or, if there was an error, this field displays the error message
that coincides with the appropriate numerical error code
message
As mentioned, the detail field provides different information depending on what the client requests.
The following table lists the different types of requests the client might submit and then describes what
information is present in the detail field for each request.
Table 128 Values for the Detail Field in the Activity Log
Detail InformationRequest Type
username provided by the clientauthentication
algorithm and key size; the value for the Deletable and Exportable options are listed
as well if they are set by the client
key generation
Secure Key Manager 253
Zobrazit stránku 252
1 2 ... 248 249 250 251 252 253 254 255 256 257 258 ... 351 352

Komentáře k této Příručce

Žádné komentáře