11.07.2015 Views

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> <strong>6.1</strong> Administrator’s <strong>Guide</strong>Replacing the Primary Database.............................................................................. 147Nominating a Replica to Replace Primary Hardware.............................................. 148Maintaining Customer-Defined Data (Extension Records)............................................ 151Managing Log Extension Data ................................................................................ 151Running External 4GL Procedures ................................................................................. 153Chapter 8: Maintaining the Log Database................................................... 155<strong>The</strong> Log Menu................................................................................................................. 155Viewing Log Database Statistics ............................................................................. 155Deleting Log Records .............................................................................................. 156Scheduling Automated Log Database Maintenance ....................................................... 157Archive Files............................................................................................................ 157Log Filtering ...................................................................................................................158Chapter 9: Reports..................................................................................................... 159Audit Trail Reports ......................................................................................................... 160Contents of a Log Record ........................................................................................ 160Report Types............................................................................................................ 161Generating Reports .................................................................................................. 162Sending a Report to a File........................................................................................ 167Extension Data Reports................................................................................................... 167Log Monitoring and Reporting ....................................................................................... 169Log Monitor Options ............................................................................................... 169Using the sdlogmon Command................................................................................ 170Monitoring <strong>Authentication</strong> <strong>Manager</strong> Events in the System Log ............................. 170Using Log Archive Files.......................................................................................... 172<strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> Report Creation Utility (Windows)................................ 174Installing the Report Creation Utility ...................................................................... 174Starting and Stopping the Report Creation Utility................................................... 174Selecting Reports to Run ......................................................................................... 175Saving the Report Run List...................................................................................... 176Standard Report Types............................................................................................. 176Report Output Files.................................................................................................. 177Creating and Managing Custom Reports................................................................. 177Displaying User Information ................................................................................... 181Running Reports from a Command Line................................................................. 182<strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> Report Creation Utility (UNIX) ..................................... 183UNIX Interface Conventions ................................................................................... 183Installing the Report Creation Utility ...................................................................... 184Starting and Stopping the Report Creation Utility................................................... 184Selecting a Report to Run ........................................................................................ 185Standard Report Types............................................................................................. 186Report Output Files.................................................................................................. 187Creating and Managing Custom Reports................................................................. 187Contents 7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!