Previous Topic: Violation RecordsNext Topic: Trace Records


Logging Records

ACFRPTRV automatically reports all SMF loggings for accesses to a resource if you specify LOG on the rule entry or in the DB2 record. With LOG, you can ensure that CA ACF2 Option for DB2 rules grant access in the way that you want. You can also use it to migrate rule sets from QUIET to ABORT mode. It lets you identify and track users who receive violation or logging records for access to resources that they need. As security administrator, you can adjust the rule entries to ensure they receive the proper access authority without disturbing their work flow.

You can use LOG in a rule entry with the SHIFT parameter to audit access to resources during specific time frames. For example, if you suspect that accesses are made outside of normal work hours (for example, 9:00 a.m. to 5:00 p.m.), you can log these accesses. To do this, create a shift record that excludes these hours (that is, one that contains 00:00–8:59 and 5:01–23:59). Associate this shift record with the resource through the SHIFT parameter of the rule entry. Specify LOG on the rule entry. When CA ACF2 Option for DB2 interprets the rule set, the rule entry with the SHIFT parameter is sorted and interpreted before a rule entry without SHIFT. Therefore, all accesses to the resource outside of normal hours (that is, during the shift record’s hours) are permitted but logged. A rule entry that grants permission to the resource without the SHIFT parameter would be interpreted next. In this case, the rule entry would apply to all accesses during normal hours (or outside the hours specified by the shift record).

Note: CA ACF2 Option for DB2 generates violation and logging records whenever an authorization check is made that violates a rule or is logged by the rule. To the ACFRPTRV report, this means: