![Red Hat CERTIFICATE SYSTEM 7.3 - ADMINISTRATION Скачать руководство пользователя страница 108](http://html.mh-extra.com/html/red-hat/certificate-system-7-3-administration/certificate-system-7-3-administration_administration-manual_1427433108.webp)
Chapter 3. Administrative Basics
86
•
Source
. Select the Certificate System component or service for which log messages are to
be displayed. Choosing
All
means messages logged by all components that log to this file are
displayed. For more information, see
Section 3.9.2, “Services That Are Logged”
.
•
Level
. Select a message category that represents the log level for filtering messages. For more
information on log levels, see
Section 3.9.3, “Log Levels (Message Categories)”
.
•
Filename
. Select the log file to view. Choose
Current
to view the currently active system log
file.
5. Click
Refresh
.
The table displays the system log entries. The entries are in reverse chronological order, with the
most current entry placed at the top. Use the scroll arrows on the right edge of the panel to scroll
through the log entries.
Each entry has the following information shown:
•
Source
. The component or resource that logged the message.
•
Level
. The severity of the corresponding entry; see
Table 3.9, “Log Levels and Corresponding
Log Messages”
for more information.
•
Date
. The date on which the entry was logged.
•
Time
. The time at which the entry was logged.
•
Details
. A brief description of the log.
6. To view a full entry, double-click it, or select the entry, and click
View
.
3.9.10. Signing Log Files
The Certificate System can digitally sign log files before they are archived or distributed for audit
purposes. This feature allows files to be checked for tampering.
This is an alternative to the signed audit logs feature. The signed audit log feature creates audit logs
that are automatically signed; this tool manually signs archived logs. See
Section 3.9.1.6, “Signed
Audit Log”
for details about signed audit logs.
For signing log files, use a command-line utility called the Signing Tool (
signtool
). For details about
this utility, see
http://www.mozilla.org/projects/security/pki/nss/tools/
.
The utility uses information in the certificate, key, and security module databases of the subsystem
instance.
To sign the log directories, use the following command with the appropriate information:
signtool -d
secdb_dir
-k
cert_nickname
-Z
output input
•
secdb_dir
specifies the path to the directory that contains the certificate, key, and security module
databases for the CA.
•
cert_nickname
specifies the nickname of the certificate to use for signing.
Содержание CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Страница 1: ...Red Hat Certificate System 7 3 Administration Guide Publication date May 2007 updated March 25 2010 ...
Страница 15: ...xv Index 525 ...
Страница 16: ...xvi ...
Страница 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Страница 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Страница 154: ...132 ...
Страница 194: ...172 ...
Страница 238: ...216 ...
Страница 244: ...222 ...
Страница 246: ...224 ...
Страница 286: ...264 ...
Страница 292: ...270 ...
Страница 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Страница 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Страница 371: ...Configuring Mappers 349 Figure 15 9 Selecting a New Mapper Type 6 Edit the mapper instance and click OK ...
Страница 398: ...376 ...
Страница 412: ...390 ...
Страница 472: ...450 ...
Страница 500: ...Appendix A Certificate and CRL Extensions 478 Parameter namen Table A 8 IssuerAlternativeName Configuration Parameters ...
Страница 506: ...484 ...
Страница 528: ...506 ...
Страница 546: ...524 ...