The audit log contains a series of entries for activities that ACL controls. Each entry includes the following information:
When the entry was created.
The unique ID of the user.
The role that is assigned to the user.
A numeric identifier for the permission.
The permission that controls the activity.
Whether the activity was allowed or denied.
The name of the server component, test case, or virtual service model (if applicable).
More information (if applicable).
Follow these steps:
Copyright © 2014 CA Technologies.
All rights reserved.
|
|