Appendix 1 - 6
SENTRY User’s Guide
Fitzgerald & Long
Subroutine: SENTRY.VIOLATION.STAMP
SENTRY.VIOLATION.STAMP is used to log access violations of user items.
Sample :
SENTRY.VIOLATION.STAMP = "*SENTRY.VIOLATION.STAMP"
CALL @SENTRY.VIOLATION.STAMP(USER.ITEM, COMMENT)
Parameters:
USER.ITEM
(Input)
The user-defined item for which the violation occurred. This reference was created through the SENTRY
User Item Maintenance screen.
COMMENT
(Input)
Free format text description of the violation.
This is a routine similar to the one which logs violations to the SENTRY Violations Log when a user with
insufficient rights attempts to use a SENTRY protected command. It will create a new entry in the
SENTRY.VIOLATIONS.LOG file. The entry will then appear in the SENTRY violations report.
Summary of Contents for Sentry
Page 4: ......
Page 18: ......
Page 21: ...SENTRY User s Guide Section 1 3 Fitzgerald Long ...
Page 29: ...SENTRY User s Guide Section 1 11 Fitzgerald Long ...
Page 30: ......
Page 60: ...Section 2 30 SENTRY User s Guide Fitzgerald Long ...
Page 102: ......
Page 109: ...SENTRY User s Guide Appendix 1 7 Fitzgerald Long ...
Page 110: ......
Page 113: ...SENTRY User s Guide Appendix 2 3 Fitzgerald Long ...