Network Deployment (Distributed operating systems), v8.0 > Reference > Sets
Context objects for security auditing
Each event has an associated set of information that is available for logging. This information is grouped into specific context objects. The context objects that are available for logging a specific event are specified by the event type. All event types have the sessionContextObj, eventContextObj, accessContextObj, propogationContextObj, processContextObj and registryContextObj objects. This topic specifies which additional context objects are available for each event type.
For more details on the auditable data that is gather for each of these context objects, see the information for context object fields.
Context objects associated with event types. The following table describes the context objects associated with event types.
Event Type Additional Context Objects SECURITY_AUTHN authnContextObj, providerContextObj SECURITY_AUTHN_DELEGATION delegationContextObj SECURITY_AUTHN_MAPPING authnMappingContextObj, providerContextObj SECURITY_AUTHZ providerContextObj, policyContextObj SECURITY_ENCRYPTION keyContextObj SECURITY_MGMT_AUDIT mgmtContextObj SECURITY_RESOURCE_ACCESS responseContextObj
Enable the security auditing subsystem
Create security auditing event type filters
Related
Context object fields