Login Account Enabled Event
Valid on UNIX
capamsc141
Valid on UNIX
Login account enabled events describe events where serevu enables a user log in.
Audit records in this event have the following format:
Date Time Status Event UserName Details Reason Terminal Program AuditFlags
- DateIdentifies the date the event occurred.Format:DD MMM YYYYPAM Server ControlEndpoint Management formats the date display according to your computer's settings.
- TimeIdentifies the time the event occurred.Format:HH:MM:SSPAM Server ControlEndpoint Management formats the time display according to your computer's settings.
- StatusIndicates serevu enabled user login.Value:E (Login enabled)
- EventIdentifies the type of event this record belongs to.PAM Server ControlEndpoint Management refers to this field simply asEvent.
- UserNameIdentifies the name of the accessor that performed the action that triggered this event.
- DetailsIndicates at which stagePAM Server Controldecided what action to take for this event.The audit record you see in a non-detailed seaudit output displays a number in this field. This number is known as the authorization stage code. In a detailed output or inPAM Server ControlEndpoint Management, the audit record displays the message associated with the authorization stage code. For a complete list of stage codes, run seaudit -t.
- ReasonIndicates the reason thatPAM Server Controlwrote an audit record.This field does not display in a detailed seaudit output or inPAM Server ControlEndpoint Management. The audit record you see in a non-detailed seaudit output displays a number in this field. This number is known as the reason code. For a complete list of reason codes, run seaudit -t.
- TerminalIdentifies the name of the terminal that the accessor used to connect to the host.
- ProgramIdentifies the name of the program that triggered the event.
- AuditFlagsIndicates whether the accessor is internal (PAM Server Controldatabase user) or an enterprise user.If the accessor is an enterprise user, the audit record you see in a non-detailed seaudit output displays the string "(OS user)" in this field. Otherwise, this field remains empty.
Example: Login Account Enabled Event Message
The following audit record was taken from a detailed seaudit output.
13 Jan 2009 17:05:00 E LOGINENABLE test1 0 5 computer.com serevu Event type: Login account enabled Status: Login enabled User name: test1 Details: Stage code 0 Terminal: computer.com Date: 13 Jan 2009 Time: 17:05 Program: serevu Audit flags: AC database userLogin account disable -
This audit record indicates that on January 13th 2009, the serevu daemon enabled user test1 to log in from the terminal computer.com.
PAM Server Control
logged this event because the serevu daemon requested the audit (reason code 5CA PAM Server Control
serevu utility requested auditing).