beautypg.com

Activity log, Fields in the activity log, Values for the detail field in the activity log – HP Secure Key Manager User Manual

Page 253

background image

Activity Log

The Activity Log contains a record of each request received by the KMS Server. For client requests
that contain multiple cryptographic operations, each operation is logged as a separate entry in the
Activity Log. Requests for cryptographic operations are not logged until the KMS Server has received
all the data from the client or an error has occurred. When there is no data for a particular field, a
dash is inserted. The format of the Activity Log is as follows:

code>

The following table describes the fields that are present in the Activity Log.

Table 127 Fields in the Activity Log

Description

Field

enclosed in brackets ( [] ), the date field shows the date and time that the SKM finished
processing the request, specified in the local time zone. The date and time are repres-
ented as follows: yyyy-mm-dd hh:mm:ss.

date

ERROR or INFO, depending on the result of the request

priority

IP address of the client machine

ip

enclosed in brackets ( [] ), the common name field displays the common name defined
in the certificate that was provided by the client. This field only has data when you re-
quire client authentication.

common name

authenticated user that issued the request

user

request ID of the client request

request id

type of client request; the request type field is the name of the XML request without the
suffix “Request.” For example, a KeyGenRequest log entry would have a request type
value of “KeyGen.”

request type

name of the key specified in the request

key

enclosed in brackets ( [] ), the detail field provides different information based on the
type of request; the details field is described in

Table 128

.

detail

numerical error code returned to the client

error code

enclosed in brackets ( [] ), the message field displays either “Success” if the server was
able to fulfill the request, or, if there was an error, this field displays the error message
that coincides with the appropriate numerical error code

message

As mentioned, the detail field provides different information depending on what the client requests.
The following table lists the different types of requests the client might submit and then describes what
information is present in the detail field for each request.

Table 128 Values for the Detail Field in the Activity Log

Detail Information

Request Type

username provided by the client

authentication

algorithm and key size; the value for the Deletable and Exportable options are listed
as well if they are set by the client

key generation

Secure Key Manager

253