beautypg.com
iv
11 Managing logs ·················································································································································· 105
Managing authentication logs ···································································································································· 105
Viewing the authentication log list ····················································································································· 105
Querying authentication logs ····························································································································· 106
Viewing authentication log details ···················································································································· 108
Exporting authentication logs ····························································································································· 109
Managing authorization logs ····································································································································· 110
Viewing the authorization log list ······················································································································ 110
Querying authorization logs ······························································································································ 111
Viewing authorization log details ······················································································································ 113
Exporting authorization logs ······························································································································ 114
Managing audit logs ··················································································································································· 115
Viewing the audit log list ···································································································································· 115
Querying audit logs ············································································································································ 116
Viewing audit log details ···································································································································· 118
Exporting audit logs ············································································································································ 119
12 Configuring global system settings ·················································································································· 121
Configuring system parameters ·································································································································· 121
Configuring the password strategy ···························································································································· 123
Configuring system operation log parameters ·········································································································· 123
Configuring RSA authentication parameters ············································································································· 124
Validating the system configuration ··························································································································· 124
13 Regular expressions ·········································································································································· 125
Overview ······································································································································································· 125
Regular expressions in commands ····························································································································· 126
Example: Permitting display commands only ··································································································· 126
Example: Denying all display commands except display current-configuration ·········································· 127
14 Acronyms and terms ········································································································································· 128