Logs
IBM Security Identity Manager logs system events during specific transactions. Log files contain levels of information about the product processes. Log files also include information about other software used to complete a task. Use the information in log files to facilitate isolating and debugging system problems.
Security Identity Manager uses the IBM Logging Toolkit for Java™ or JLog libraries for message logging and trace facilities. JLog is a set of Java packages for incorporating message logging in Java applications. JLog can extend the logging functions to suit your needs. We can also use JLog to set logging configuration using the enRoleLogging.properties file instead of programming it. We can change the logging configuration without stopping Security Identity Manager.
- Installation and initial configuration logs
This section describes ISIM Server installation and initial configuration logs.- IBM Security Identity Manager operational logs
Operational log files contain information about processing activities. These activities are associated with the communication between ISIM Server and other applications.- Prerequisite product logs
This section describes logging for the middleware products. It also provides links to websites for more information about logging.Parent topic: Diagnostic tools