EasyManuals Logo

Red Hat 8.1 User Manual

Default Icon
292 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #172 background imageLoading...
Page #172 background image
Example 5.7, “Access Control Summary Logging shows the summary access control log entry.
Exa mple 5.7. Access Control Summary Logging
[09/Jan/2009:16:02:01 -0500] NSACLPlugin - #### conn=24826547353419844 op=1
binddn="uid=scarter,ou=people,dc=example,dc=com"
[09/Jan/2009:16:02:01 -0500] NSACLPlugin - conn=24826547353419844 op=1 (m ain):
Allow search on entry(ou=people,dc=example,dc=com).attr(uid) to
uid=scarter,ou=people,dc=example,dc=com: allowed by aci(2): aciname= "Enable
anonymous access", acidn="dc=exam ple,dc=com"
5.3. Audit Log Reference
The audit log records changes made to the server instance. Unlike the error and access log, the audit
log does not record access to the server instance, so searches against the database are not logged.
The audit log is formatted differently than the access and error logs and is basically like a time-stamped
LDIF file. The operations recorded in the audit log are formatted as LDIF statements:
timestam p: date
dn: modified_entry
changetype: action
action:attribute
attribute:new_value
-
replace: m odifiersname
m odifiersnam e: dn
-
replace: m odifytimestam p
m odifytim estam p: date
-
LDIF files and formats are described in more detail in the "LDAP Data Interchange Format" appendix of
the Administrator's Guide.
Several different kinds of audit entries are shown in Example 5.8, “Audit Log Content”.
172 Chapter 5. Log File Reference

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Red Hat 8.1 and is the answer not in the manual?

Red Hat 8.1 Specifications

General IconGeneral
BrandRed Hat
Model8.1
CategoryServer
LanguageEnglish

Related product manuals