
Signed Audit Log
268
Red Hat Certificate System Administrator’s Guide • September 2005
Deleting a Log Module
You can delete unwanted log plug-in modules using the CS console. Before deleting a
module, be sure to delete all the listeners that are based on this module; see “Log File
Rotation” on page 260.
To delete a module:
1.
Log in to the CS console (see “Logging Into the CS Console” on page 239).
2.
Select the Configuration tab.
3.
In the navigation tree, select Logs, and then in the right pane, select the Log Event
Listener Plug-in Registration tab.
4.
In the Plug-in Name list, select the module you want to delete and click Delete.
5.
When prompted, confirm the delete action.
Signed Audit Log
The signed audit log is a feature that creates a log recording system events; the events that
are recorded are selectable from a list of events. This feature, when enabled, records all
system events and produces a verbose set of messages about this activity; be careful when
using this feature to provide enough space in your file system for this log. The signed audit
log feature is disabled by default.
You can also set this audit log up as a signed audit log. You enable this by setting the
logSigning
parameter to enable and providing the nickname of the certificate that will be
used to sign this log.
When this log is setup as a signed audit log, only a user with auditor privileges can access
and view the log. Auditors can use the
AuditVerify
tool to verify that signed audit logs
have not been tampered with.
When you first set the server up, if you have not created a dedicated certificate for log
signing, but you want to turn on the auditing feature anyway, you can use the singing
certificate for that subsystem to sign the logs. To do this, specify
caSigningCert
cert-<CS instance name>
as the value in the
signedAuditCertNickname
parameter
for a Certificate Manager, specify the appropriate signing certificate for other subsystems.
You can also configure which events are recorded in the log by adding or deleting the event
type form the value of the events parameter. Table 8-3 lists the events that are loggable
events. To add an event, add the logging event to the list; to delete an event, remove it from
the list. Log events are separated by commas with no spaces.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...