Chapter 9 Working with Logging and Reports
Special Logging Attributes
9-2
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
charts or perform queries, such as determining how many hours a user was
logged in to the network during a given period. For information about how to
use a CSV file in a third-party application such as Microsoft Excel, please see
the documentation supplied by the third-party vendor. You can access the
CSV files either on the Cisco Secure ACS server hard drive or by
downloading the CSV file from the HTML interface. For more information
about downloading the CSV file from the HTML interface, see
Viewing a
CSV Report, page 9-15
.
•
ODBC-compliant database tables—ODBC logging enables you to
configure Cisco Secure ACS to log directly in an ODBC-compliant relational
database, where it is stored in tables, one table per log. After the data is
exported to the relational database, you can use the data however you need.
For more information about querying the data in your relational database,
refer to the documentation supplied by the relational database vendor.
For information about the formats available for a specific log, see
About
Cisco Secure ACS Logs and Reports, page 9-4
.
Special Logging Attributes
Among the many attributes that Cisco Secure ACS can record in its logs, a few are
of special importance. The following list explains the special logging attributes
provided by Cisco Secure ACS.
•
User Attributes—These logging attributes appear in the Attributes list for
any log configuration page. Cisco Secure ACS lists them using their default
names: Real Name, Description, User Field 3, User Field 4, and User Field 5.
If you change the name of a user-defined attribute, the default name rather
than the new name still appears in the Attributes list.
The content of these attributes is determined by the values entered in the
corresponding fields in the user account. For more information about user
attributes, see
User Data Configuration Options, page 3-3
.
•
ExtDB Info—If the user is authenticated with an external user database, this
attribute contains a value returned by the database. In the case of a Windows
NT/2000 user database, this attribute contains the name of the domain that
authenticated the user.
•
Access Device—The name of the AAA client sending the logging data to
Cisco Secure ACS.