i5/OS® auditing for EIM

 

What auditing you perform is an important consideration for your overall security plan.

When you configure and use Enterprise Identity Mapping (EIM), you may want to configure auditing support for the directory server to ensure you provide the appropriate level of accountability that your security policy requires. For example, auditing support can be helpful in determining which of the users mapped by a policy association performed an action on your system or changed an object.

 

Parent topic:

Enterprise Identity Mapping concepts

 

Related information


Directory Server Auditing