You can use all AOF variable types in SEC rules, as described in the chapter “AOF Rule Tools.” You can use the following unique AOF event variables in the )PROC section of a SEC rule, and you can manually interrogate the corresponding OPSLOG display field as an aid in debugging or implementing rule logic.
A description of the current security event. Taken from the full security event text of the CA OPS/MVS component that the user is trying to use, the description consists of:
eventtype||de-aliased verb|| ' ' commandtext
Data Type: Character, read-only
Sample Value: OPSCMDSTOP P OPSS
OPSLOG Browse Column: Text is always displayed.
The SEC.TYPE variable determines which rules execute for the current security event.
The type of security request from the CA OPS/MVS component that the user is trying to access. See the event types listed in the description of the SEC.TEXT variable.
Data Type: Character, read-only
Sample Value: OPSPARM
Notes:
OPSLOG Browse Column: MSGID
The primary purpose of the USER variable is to provide a method to pass a small amount of data between the rules. This data may be binary or mixed case. The USER field may also be used for filtering in the OPSLOG. However, USER data used for OPSLOG filtering must be uppercase and displayable.
An 8-byte variable providing communication between rules that execute for the same security event. The variable can contain any installation data that these rules need, and it can store a character string displayable through OPSLOG Browse.
Data Type: User-defined, read/write
Note: Before AOF processing, this variable is initialized to binary zeros. It is then passed to each rule that executes for the same security event. Each rule can look at or change the variable contents before passing the variable to the next rule for the security event.
OPSLOG Browse Column: USER
|
Copyright © 2011 CA.
All rights reserved.
|
|