Hp Secure Key Manager Manuel d'utilisateur Page 232

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 327
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 231
data from the client or an error has occurred. When there is no data for a particular eld, a dash is
inserted. The format of the Activity Log is as follows:
<date> <priority> <ip> <common name> <user> <request id> <request type> <key> <detail> <error
code> <message>
Thefollowingtabledescribestheelds that are present in the Activity Log.
Table126FieldsintheActivityLog
Field
Description
date
enclosed in brackets ( [] ), the date eld shows the date and time that the SKM
nished processing the request, specied in the local time zone. The date and time
are represented as follows: yyyy-mm-dd hh:mm:ss.
priority
ERROR or INFO,
depending on the result of the request
ip
IP address of the client machine
common name
enclosed in brackets ( [] ), the common name eld displays the common name dened
in the certicate that was provided by the client. This eld only has data when you
require client authentication.
user
authenticated user that issued the request
request id
request ID of the client request
request type
type of client request; the request type eld is the name of the XML request without
the sufx “Request.” For example, a KeyGenRequest log entry would have a request
type value of “KeyGen.
key
name of the k
ey specied in the request
detail
enclosed in brackets ( [] ), the detail eld provides different information based on the
type of request; the details eld is described in Table 127.
error code numerical error code returned to the client
message
enclosed in brackets ( [] ), the message eld displays either “Success” if the server was
able to ful
ll the request, or, if there was an error, this eld displays the error message
that coin
cides with the appropriate numerical error code
As mention
ed, the detail eld provides different information depending on what the client requests.
The follo
wing table lists the different types of requests the client might submit and then describes what
informat
ion is present in the detail eld for each request.
232
Using the Management Console
Vue de la page 231
1 2 ... 227 228 229 230 231 232 233 234 235 236 237 ... 326 327

Commentaires sur ces manuels

Pas de commentaire