Configuration Auditing
When we are managing API Access Control resource servers, resources, or resource access policies there are a number of IBM Security Verify Access operations performed internally.
A log file is used to audit the type of operation and who it was performed by. This file is located in the application log files directory /isam_runtime/policy_server/api_access_control.log. The following is an example of a log entry. It shows:
- The date and time the operation was performed.
- The name of the LMI user that performed the operation (admin).
As this is a pdadmin operation the name of the IBM Security Verify Access user that ran the command (sec_master).
- The actual command that was run.
Apr 01, 2019 9:40:48 PM ApiAccessControl User:admin pdadmin> : sec_master -> server task default create -t ssl -h 192.168.42.131 -p 443 -x /test
Parent topic: Overview of the API Access Control