Shutdown Event
shutdown events describe shutdown processes that are performed by an administrator or sub-administrator user with privileges to shutdown the system.
capamsc141
PAM Server Control
shutdown events describe shutdown processes that are performed by an administrator or sub-administrator user with privileges to shutdown the system.Audit records in this event have the following format:
Date Time M Event UserName SessionID Details Service AuditFlags
- DateIdentifies the date that the event occurred.Format:DD MMM YYYYNote:PAM Server ControlEndpoint Management formats the date display according to your computer settings.
- TimeIdentifies the time that the event occurred.Format:HH:MM:SSNote:PAM Server ControlEndpoint Management formats the time display according to your computer settings.
- Event TypeIdentifies the type of event this record belongs to.Note:PAM Server ControlEndpoint Management refers to this field simply asEvent.
- User NameIdentifies the name of the accessor that performed the action that triggered this event.
- User Logon Session IDIdentifies the accessor's session ID.Note:By default this field does not appear in a non-detailed seaudit output. To display this field in a non-detailed seaudit output, specify the -sessionid option in the seaudit command.
- DetailsIndicates at which stagePAM Server Controldecided what action to take for this event.Note:The audit record that you see in a non-detailed seaudit output displays a number in this field. This number is known as the authorization stage code. In a detailed output or inPAM Server ControlEndpoint Management, the audit record displays the message that is associated with the authorization stage code. For a complete list of stage codes, run seaudit -t.
- Daemon (UNIX) / Engine service (Windows)Identifies the name of thePAM Server Controldaemon (UNIX) or service (Windows) that was shut down.Value:seosd (thePAM Server ControlEngine).
- Audit FlagsIndicates whether the accessor is internal (PAM Server Controldatabase user) or an enterprise user.Note:If the accessor is an enterprise user, the audit record you see in a non-detailed seaudit output displays the string "(OS user)" in this field. Otherwise, this field remains empty.
Example: Shutdown Event Message on UNIX
The following audit record was taken from a detailed seaudit output.
24 Sep YYYY 15:40:46 M SHUTDOWN root 452 seosdEvent type: Daemon shutdownUser name: rootDaemon: seosdDate: 24 Sep YYYYTime: 15:40:46Details: User is ADMIN or SPECIALUser Logon Session ID: 48da26ce:00000142Audit flags: CA PAMSC database user
This audit record indicates that on September 24th of the specified year, the user root who was attempting to shutdown
PAM Server Control
was permitted to do so because the user has the ADMIN attribute (authorization stage code 452User is ADMIN or SPECIAL).Example: Shutdown Event Message on Windows
The following audit record was taken from a detailed seaudit output.
23 Dec YYYY 12:56:20 D SHUTDOWN tst002 460 seosdEvent type: Engine service shutdownUser name: tst002Engine service: seosdDate: 10 Feb 2009Time: 12:56Details: User is not allowed to shutdown CA PAMSCUser Logon Session ID: 00000000:04c240d5Audit flags: AC database user
This audit record indicates that on December 23rd of the specified year, the
PAM Server Control
shut down was denied because the user tst002 is not allowed to shutdown the product (authorization stage code 460User is not allowed to shutdown PAM Server Control
).