Novell eDirectory 8.8 Administration Guide

Type
Administration Guide
NetIQ
®
eDirectory
8.8 SP8
XDASv2 Administration Guide
September 2013
Legal Notice
THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE
SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS
EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ
CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS"
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT
ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS
STATEMENT MAY NOT APPLY TO YOU.
For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of
the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates
with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of
the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of
the Module and contact NetIQ for further instructions.
This document and the software described in this document may not be lent, sold, or given away without the prior written
permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license
agreement or non-disclosure agreement, no part of this document or the software described in this document may be
reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise,
without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for
illustration purposes and may not represent real companies, individuals, or data.
This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information
herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in
or changes to the software described in this document at any time.
U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S.
Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-
4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the
government’s rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display
or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions
provided in the license agreement.
© 2013 NetIQ Corporation and its affiliates. All Rights Reserved.
For information about NetIQ trademarks, see https://www.netiq.com/company/legal/.
Contents 3
Contents
About this Book and the Library 5
About NetIQ Corporation 7
1 Overview 9
1.1 Key Benefits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
1.2 XDASv2 Server Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
2 Configuring XDASv2 11
2.1 Installing eDirectory and XDASv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.1 XDASv2 Files Installed with eDirectory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.2 Upgrading iManager Plugins For XDASv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.3 Configuring the XDASv2 Property File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
2.2 Configuring XDAS Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
2.2.1 Loading and Unloading the Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
2.3 Enabling XDAS Event Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
2.4 Using Collectors for XDAS Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3 Understanding XDASv2 Auditing Event Filtering 29
3.1 Filtering XDASv2 Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
3.2 Filtering XDASv2 Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
4 iManager Plug-In for XDASv2 31
4.1 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
4.2 Installing the iManager Plug-In for XDASv2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
4.3 Using the iManager Plug-In Console for XDASv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
4.4 Configuring XDASv2 Events for Auditing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
4.4.1 Configuring Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
5 XDASv2 Events 35
5.1 Account Management Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
5.1.1 Examples for Account Management Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
5.2 Session Management Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
5.2.1 Examples for Session Management Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
5.3 Data Item and Resource Element Management Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
5.3.1 Examples for Data Item and Resource Element Management Events . . . . . . . . . . . . . . . .44
5.4 Service or Application Management Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
5.4.1 Examples for Service or Application Management Events . . . . . . . . . . . . . . . . . . . . . . . . .46
5.5 Service or Application Utilization Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
5.5.1 Examples for Service or Application Utilization Events . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
5.6 Trust Management Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
5.6.1 Examples for Trust Management Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
5.7 Peer Association Management Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5.7.1 Examples for Peer Association Management Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
5.8 Data Item or Resource Element Content Access Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
5.8.1 Examples for Data Item and Resource Element Management Events . . . . . . . . . . . . . . . .52
4 NetIQ XDASv2 Administration Guide
5.9 Role Management Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
5.9.1 Examples for Role Management Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
5.10 Exceptional Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
5.10.1 Examples for Exceptional Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
5.11 Authentication Management Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
5.11.1 Examples for Authentication Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
5.12 Operational Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
6 Troubleshooting 61
A XDASv2 Schema 63
A.1 XDAS V2 JSON Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
A.2 XDAS Field Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
A.3 Outcome Codes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
A.4 Example of an Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
About this Book and the Library 5
About this Book and the Library
The XDASv2 Administration Guide describes how to configure and use XDASv2 to audit the NetIQ
eDirectory and NetIQ Identity Manager.
For the most recent version of the NetIQ XDASv2 Administration Guide, see the NetIQ eDirectory 8.8
online documentation (https://www.netiq.com/documentation/edir88/) Web site.
Intended Audience
The guide is intended for network administrators.
Other Information in the Library
The library provides the following information resources:
Administration Guide
Describes how to manage and configure eDirectory.
Installation Guide
Describes how to install eDirectory. It is intended for network administrators.
Troubleshooting Guide
Describes how to resolve eDirectory issues.
Tuning Guide for Linux Platforms
Describes how to analyze and tune eDirectory on Linux platforms to yield superior performance
in all deployments.
What’s New Guide
Describes the new features of eDirectory.
These guides are available at NetIQ eDirectory 8.8 documentation Web site (https://www.netiq.com/
documentation/edir88/).
For information about the eDirectory management utility, see the NetIQ iManager 2.7 Administration
Guide (https://www.netiq.com/documentation/imanager/).
6 NetIQ XDASv2 Administration Guide
About NetIQ Corporation 7
About NetIQ Corporation
We are a global, enterprise software company, with a focus on the three persistent challenges in your
environment: Change, complexity and risk—and how we can help you control them.
Our Viewpoint
Adapting to change and managing complexity and risk are nothing new
In fact, of all the challenges you face, these are perhaps the most prominent variables that deny
you the control you need to securely measure, monitor, and manage your physical, virtual, and
cloud computing environments.
Enabling critical business services, better and faster
We believe that providing as much control as possible to IT organizations is the only way to
enable timelier and cost effective delivery of services. Persistent pressures like change and
complexity will only continue to increase as organizations continue to change and the
technologies needed to manage them become inherently more complex.
Our Philosophy
Selling intelligent solutions, not just software
In order to provide reliable control, we first make sure we understand the real-world scenarios in
which IT organizations like yours operate — day in and day out. That's the only way we can
develop practical, intelligent IT solutions that successfully yield proven, measurable results. And
that's so much more rewarding than simply selling software.
Driving your success is our passion
We place your success at the heart of how we do business. From product inception to
deployment, we understand that you need IT solutions that work well and integrate seamlessly
with your existing investments; you need ongoing support and training post-deployment; and you
need someone that is truly easy to work with — for a change. Ultimately, when you succeed, we
all succeed.
Our Solutions
Identity & Access Governance
Access Management
Security Management
Systems & Application Management
Workload Management
Service Management
8 NetIQ XDASv2 Administration Guide
Contacting Sales Support
For questions about products, pricing, and capabilities, contact your local partner. If you cannot
contact your partner, contact our Sales Support team.
Contacting Technical Support
For specific product issues, contact our Technical Support team.
Contacting Documentation Support
Our goal is to provide documentation that meets your needs. If you have suggestions for
improvements, click
Add Comment at the bottom of any page in the HTML versions of the
documentation posted at www.netiq.com/documentation. You can also email Documentation-
[email protected]. We value your input and look forward to hearing from you.
Contacting the Online User Community
Qmunity, the NetIQ online community, is a collaborative network connecting you to your peers and
NetIQ experts. By providing more immediate information, useful links to helpful resources, and
access to NetIQ experts, Qmunity helps ensure you are mastering the knowledge you need to realize
the full potential of IT investments upon which you rely. For more information, visit http://
community.netiq.com.
Worldwide: www.netiq.com/about_netiq/officelocations.asp
United States and Canada: 1-888-323-6768
Web Site: www.netiq.com
Worldwide: www.netiq.com/support/contactinfo.asp
North and South America: 1-713-418-5555
Europe, Middle East, and Africa: +353 (0) 91-782 677
Web Site: www.netiq.com/support
1
Overview 9
1
Overview
The XDASv2 specification provides a standardized classification for audit events. It defines a set of
generic events at a global distributed system level. XDASv2 provides a common portable audit record
format to facilitate the merging and analysis of audit information from multiple components at the
distributed system level. The XDASv2 events are encapsulated within a hierarchical notational
system that helps to extend the standard or existing event identifier set.The XDASv2 taxonomy
defines a set of fields, of these the primary fields are observer, initiator and target. XDASv2 events
helps you easily understand the audit trails of heterogeneous applications
Section 1.1, “Key Benefits,” on page 9
Section 1.2, “XDASv2 Server Architecture,” on page 9
1.1
Key Benefits
Provides secured audit services for a distributed system.
Defines a set of generic events at a global distributed system level.
Defines a common portable audit record format to help merge and analyze the audit information
from multiple components of a distributed system.
Defines a common format for audit events that analysis applications can use.
Records XDASv2 audit trail.
Configures event preselection criteria and event disposition actions.
Provides a common audit format regardless of the platform on which the XDASv2 service is
running.
Supports heterogeneous environments without the necessity to re-engineer the current
operating system or application-specific audit service implementations.
Supports adequate separation of duties for users.
Protects the audit log by making it accessible only to principals acting in specific administrative
or security roles.
Optionally caches audit events locally on the agent in case of communication failure between the
agent and the auditing server and re-sends events when communication is re-established.
1.2
XDASv2 Server Architecture
10 NetIQ XDASv2 Administration Guide
Figure 1-1 XDASv2 Server Architecture
2
Configuring XDASv2 11
2
Configuring XDASv2
This chapter contains the following information:
Section 2.1, “Installing eDirectory and XDASv2,” on page 11
Section 2.2, “Configuring XDAS Events,” on page 18
Section 2.3, “Enabling XDAS Event Caching,” on page 27
Section 2.4, “Using Collectors for XDAS Events,” on page 27
2.1
Installing eDirectory and XDASv2
2.1.1
XDASv2 Files Installed with eDirectory
The following eDirectory XDASv2 files are, by default, installed as part of eDirectory.
Linux
novell-edirectory-xdaslog
novell-edirectory-xdaslog-conf
novell-edirectory-xdasinstrument
Windows
xdasauditds.dlm
xdaslog.dll
NOTE: From the OES 11 SP2 release, the XDAS RPMs are bundled with the Open Enterprise
Server.
2.1.2
Upgrading iManager Plugins For XDASv2
You can upgrade the iManager Audit plugins to latest version.
1 Log in to the iManager console.
1a Open iManager from a Web browser, using the following URL:
https://ip_address_or_DNS/nps/iManager.html
where ip_address_or_DNS is the IP address or DNS name of your iManager server.
For example:
http://192.168.0.5/nps/iManager.html
1b Log in using your username and password.
12 NetIQ XDASv2 Administration Guide
In iManager, you have access only to those roles for which you have assigned rights. To
have full access to all NetIQ iManager features, you must log in as a user with Admin rights
to the tree.
For more information, see “Accessing iManager” in the NetIQ iManager 2.7 Administration
Guide.
2 Select Audit Configuration from Roles and Tasks.
3 Click the Upgrade XDAS Configuration link.
An alert message about the upgrade process is displayed.
4 Click Ok.
During upgrade, new iManager files are installed and they cause configuration changes. After
the upgrade completes, a message is displayed stating the success or failure status of the
installation.
2.1.3
Configuring the XDASv2 Property File
When you install eDirectory, the installer lay down the
xdasconfig.properties.template
file in the
configdir
(
n4u.server.configdir
) directory.
Table 2-1 lists the default location of the
xdasconfig.properties
file in different operating systems.
Table 2-1 XDAS Configuration File
If you configure the property file and then upgrade your environment to eDirectory 8.8 SP7, the
installer does not replace it. Instead, it updates the file
(xdasconfig.properties.template
) to
retain customization.
After you install iManager, you can configure XDAS. The XDAS configuration settings are stored in a
simple text-based
xdasconfig.properties
configuration file. You can customize the file according
to your requirements.
The following is the content of the XDASv2 property file:
Linux
# Set the level of the root logger to DEBUG and attach appenders.
#log4j.rootLogger=debug, S, R
# Defines appender S to be a SyslogAppender.
#log4j.appender.S=org.apache.log4j.net.SyslogAppender
Operating System File
Linux
/etc/opt/novell/eDirectory/conf/
xdasconfig.properties
For non-root installations, the XDASv2 property file is located in the
conf
directory.
Windows
<Install Path>/novell/nds/xdasconfig
The property file is usually in the eDirectory installation directory.
Configuring XDASv2 13
# Defines location of Syslog server.
#log4j.appender.S.Host=localhost
#log4j.appender.S.Port=port
# Specify protocol to be used (UDP/TCP/SSL)
#log4j.appender.S.Protocol=UDP
# Specify SSL certificate file for SSL connection.
# File path should be given with double backslash.
#log4j.appender.S.SSLCertFile=/etc/opt/novell/mycert.pem
# Minimum log-level allowed in syslog.
#log4j.appender.S.Threshold=INFO
# Defines the type of facility.
#log4j.appender.S.Facility=USER
# Defines caching for SyslogAppender.
# Inputs should be yes/no
#log4j.appender.S.CacheEnabled=no
# Cache location directory
# Directory should be available for creating cache files
#log4j.appender.S.CacheDir=/var/opt/novell/eDirectory
# Cache File Size
# Cache File Size should be in the range of 50MB to 4000MB
#log4j.appender.S.CacheMaxFileSize=500MB
# Layout definition for appender Syslog S.
#log4j.appender.S.layout=org.apache.log4j.PatternLayout
#log4j.appender.S.layout.ConversionPattern=%c : %p%m%n
# Defines appender R to be a Rolling File Appender.
#log4j.appender.R=org.apache.log4j.RollingFileAppender
# Log file for appender R.
#log4j.appender.R.File=/var/opt/novell/eDirectory/log/xdas-events.log
# Max size of log file for appender R.
#log4j.appender.R.MaxFileSize=100MB
# Set the maximum number of backup files to keep for appender R.
# Max can be 13. If set to zero, then there will be no backup files.
#log4j.appender.R.MaxBackupIndex=10
# Layout definition for appender Rolling log file R.
#log4j.appender.R.layout=org.apache.log4j.PatternLayout
#log4j.appender.R.layout.ConversionPattern=%d{MMM dd HH:mm:ss} %c : %p%m%n
Windows
# Set the level of the root logger to DEBUG and attach appenders.
#log4j.rootLogger=debug, S, R
# Defines appender S to be a SyslogAppender.
#log4j.appender.S=org.apache.log4j.net.SyslogAppender
# Defines location of Syslog server.
#log4j.appender.S.Host=localhost
#log4j.appender.S.Port=port
# Specify protocol to be used (UDP/TCP/SSL)
#log4j.appender.S.Protocol=UDP
14 NetIQ XDASv2 Administration Guide
# Specify SSL certificate file for SSL connection.
# File path should be given with double backslash.
#log4j.appender.S.SSLCertFile=C:\\Novell\\mycert.pem
# Minimum log-level allowed in syslog.
#log4j.appender.S.Threshold=INFO
# Defines the type of facility.
#log4j.appender.S.Facility=USER
# Defines caching for SyslogAppender.
# Inputs should be yes/no
#log4j.appender.S.CacheEnabled=no
# Cache location directory
# Directory should be available for creating cache files
#log4j.appender.S.CacheDir=C:\\Novell\\NDS
# Cache File Size
# Cache File Size should be in the range of 50MB to 4000MB
#log4j.appender.S.CacheMaxFileSize=500MB
# Layout definition for appender Syslog S.
#log4j.appender.S.layout=org.apache.log4j.PatternLayout
#log4j.appender.S.layout.ConversionPattern=%c : %p%m%n
# Defines appender R to be a Rolling File Appender.
#log4j.appender.R=org.apache.log4j.RollingFileAppender
# Log file for appender R.
#log4j.appender.R.File=/var/opt/novell/eDirectory/log/xdas-events.log
# Max size of log file for appender R.
#log4j.appender.R.MaxFileSize=100MB
# Set the maximum number of backup files to keep for appender R.
# Max can be 13. If set to zero, then there will be no backup files.
#log4j.appender.R.MaxBackupIndex=10
# Layout definition for appender Rolling log file R.
#log4j.appender.R.layout=org.apache.log4j.PatternLayout
#log4j.appender.R.layout.ConversionPattern=%d{MMM dd HH:mm:ss} %c : %p%m%n
Table 2-2 XDASv2 Property File
The entries in the
xdasconfig.properties
file are not case sensitive, entries can appear in any
order, empty lines are valid, and any line that starts with a hash (#) is commented out.
The following table provides an explanation of each setting in the
xdasconfig.properties
file.
IMPORTANT: You must restart eDirectory any time you make a change to the configuration.
Options ID
Syslog Appender S
Rolling File Appender R
Configuring XDASv2 15
Table 2-3 XDAS Settings
Setting Description
log4j.rootLogger=debug, S, R Sets the level of the root logger to debug and attaches
an appender named R or S, where S specifies a
Syslog appender and R specifies a Rolling File
appender.
log4j.appender.S=org.apache.log4j.net.SyslogAppen
der
Specifies the appender S to be a Syslog appender.
log4j.appender.S.Host=
localhost Specifies the location of the Syslog server where
XDAS events are logged.
IFor example,
log4j.appender.S.Host=192.168.0.1
log4j.appender.S.Port=
port The port at which the XDAS connects to the Syslog
server.
The port supports values from 1 to 65535. If you
specify an invalid value, the port defaults to 514.
If the connection between XDAS and the Syslog
server fails, Identity Manager cannot log events until
the connection is restored.
log4j.appender.S.Protocol=UDP Specifies the protocol to use. For example, UDP, TCP,
or SSL.
log4j.appender.S.SSLCertFile=
/etc/opt/novell/
mycert.pem
Specifies the SSL certificate file for the SSL
connection. Use double backslashes to specify the
path of the file. This is an optional setting.
log4j.appender.S.Threshold=INFO Specifies the minimum log level allowed in the Syslog
appender. Currently, the INFO log level is supported.
log4j.appender.S.Facility=USER Specifies the type of facility. The facility is used to try to
classify the message.Currently, USER facility is
supported. These values may be specified as upper or
lower case characters.
log4j.appender.S.layout=
org.apache.log4j.PatternLay
out
Layout setting for Syslog appender.
log4j.appender.S.layout.ConversionPattern
=%c :
%p%m%n
Layout setting for Syslog appender. For information
about the conversion patters and their descriptions,
see logging.apache.org.
log4j.appender.R=org.apache.log4j.RollingFileAppen
der
Specifies appender R to be a Rolling File appender.
log4j.appender.R.File=
/var/opt/novell/eDirectory/log/
xdas-events.log
The location of the log file for a Rolling File appender.
log4j.appender.R.MaxFileSize=
100MB The maximum size, in MBs, of the log file for a Rolling
File appender. Set this value to the maximum size that
the client allows.
16 NetIQ XDASv2 Administration Guide
The following examples illustrate the date and time patterns interpreted in the U.S. The given date
and time are 2012-07-04 12:08:56 local time in the U.S. Pacific Time time zone.
Table 2-4 Date and Time Pattern Example
Enabling Syslog Appender
You can use the Syslog appender, if you want centralize the auditing messages at one place.
Additionally, a Syslog server offers better backup support in the event of a disaster.
To enable the Syslog appender, make the following changes in the
xdasxconfig.properties
file:
1 Change the following entry to S to attach a Syslog appender:
log4j.rootLogger=debug, S
2 Uncomment the following entries:
log4j.appender.S=org.apache.log4j.net.SyslogAppender
log4j.appender.S.Host=localhost
log4j.appender.S.Port=port
log4j.appender.S.Protocol=UDP
log4j.appender.R.MaxBackupIndex=10 Specify the maximum number of backup files for a
Rolling File appender.
The maximum number of the backup files can be 10. A
zero value means no backup files.
log4j.appender.R.layout=
org.apache.log4j.PatternLay
out
Layout setting for Rolling File appender.
log4j.appender.R.layout.ConversionPattern=
%d{MMM
dd HH:mm:ss} %c : %p%m%n
Layout setting for Rolling File appender. See Table 2-4
on page 16 for simple date format patterns.
For information about the conversion patters and their
descriptions, see logging.apache.org
Date and Time Pattern Result
"yyyy.MM.dd G 'at' HH:mm:ss z" 2012.07.04 AD at 12:08:56 PDT
"EEE, MMM d, ''yy" Wed, Jul 4, '01
"h:mm a" 12:08 PM
"hh 'o''clock' a, zzzz" 12 o'clock PM, Pacific Daylight Time
"K:mm a, z" 0:08 PM, PDT
"yyyyy.MMMMM.dd GGG hh:mm aaa" 02012.July.24 AD 12:08 PM
"EEE, d MMM yyyy HH:mm:ss Z" Wed, 24 Jul 2012 12:08:56 -0700
"yyMMddHHmmssZ" 120724120856-0700
"yyyy-MM-dd'T'HH:mm:ss.SSSZ" 2012-07-04T12:08:56.235-0700
Setting Description
Configuring XDASv2 17
log4j.appender.S.SSLCertFile=/etc/opt/novell/mycert.pem
#log4j.appender.S.Threshold=INFO
#log4j.appender.S.Facility=USER
#log4j.appender.S.layout=org.apache.log4j.PatternLayout
#log4j.appender.S.layout.ConversionPattern=%c : %p%m%n
3 Log into iManager and change the log events. For information about configuring XDAS Events,
see Section 2.2, “Configuring XDAS Events,” on page 18.
Generating Certificate for Syslog SSL Connection
To generate a certificate for syslog connection:
1. Create the certificate by using the following OpenSSL command:
openssl s_client -host LOG_SERVER -port 1443 -showcerts
2. Copy the certificate you created to the
/etc/opt/novell/eDirectory/conf/
xdasconfig.properties
file.
Enabling Rolling File Appender
The File appender is preferred, if the auditing solution is limited to an individual server. Also, it is easy
to bring up this solution because the number of components to be setup are few and thus, is more
suited for demonstrations.
To enable the Rolling File appender, make the following changes in the
xdasxconfig.properties
file:
1 Change the following entry to R to attach a Rolling File appender.
log4j.rootLogger=debug, R
2 Uncomment the following entries:
log4j.appender.R=org.apache.log4j.RollingFileAppender
log4j.appender.R.File=/var/opt/novell/eDirectory/log/xdas-events.log
log4j.appender.R.MaxFileSize=100MB
log4j.appender.R.MaxBackupIndex=10
log4j.appender.R.layout=org.apache.log4j.PatternLayout
log4j.appender.R.layout.ConversionPattern=%d{MMM dd HH:mm:ss} %c : %p%m%n
3 Select the desired event from iManager.
For information about configuring XDAS Events, see Section 2.2, “Configuring XDAS Events,”
on page 18.
18 NetIQ XDASv2 Administration Guide
2.2
Configuring XDAS Events
For information about configuring XDASv2 events for eDirectory, see Section 4.4, “Configuring
XDASv2 Events for Auditing,” on page 32.
Table 2-5 on page 18 lists how eDirectory internal events are mapped to XDAS events.
NOTE: For information about eDirectory events and their description, see (http://support.novell.com/
techcenter/articles/dnd19970708.html)
Table 2-5 Mapping XDAS Events with eDirectory Events
XDAS Event eDirectory Event
CREATE_ACCOUNT
For an example of this event, see “Create Account” on
page 37.
DSE_CREATE_ENTRY
DSE_LDAP_ADD
DSE_LDAP_ADDRESPONSE
DSE_NAME_COLLISION
DELETE_ACCOUNT
For an example of this event, see “Delete Account” on
page 38.
DSE_DELETE_ENTRY
DSE_LDAP_DELETE
DSE_LDAP_DELETERESPONSE
DSE_MOVE_SOURCE_ENTRY
DSE_REMOVE_ENTRY
ENABLE_ACCOUNT
For an example of this event, see “Enable Account” on
page 39.
DSE_ADD_VALUE
DISABLE_ACCOUNT
For an example of this event, see “Disable Account”
on page 39.
DSE_ADD_VALUE
QUERY_ACCOUNT
For an example of this event, see “Query Account” on
page 39.
DSE_DSA_READ
DSE_INSPECT_ENTRY
DSE_LDAP_SEARCH
DSE_LDAP_SEARCHENTRYRESPONSE
DSE_SEARCH
DSE_LDAP_COMPARE
Configuring XDASv2 19
MODIFY_ACCOUNT
For an example of this event, see “Modify Account” on
page 39.
DSE_ADD_VALUE
DSE_DELETE_ATTRIBUTE
DSE_DELETE_VALUE
DSE_LDAP_MODDN
DSE_LDAP_MODDNRESPONSE
DSE_LDAP_MODIFY
DSE_LDAP_MODIFYRESPONSE
DSE_MERGE_ENTRIES
DSE_MODIFY_ENTRY
DSE_MODIFY_RDN
DSE_RENAME_ENTRY
MODIFY_ACCOUNT_SECURITY_TOKEN
For an example of this event, see “Modify Account
Security Token” on page 40.
DSE_CHGPASS
CREATE_SESSION
For an example of this event, see “Create Session” on
page 41.
To monitor the Authenticate Session event, you need
to enable both the XDAS and NMAS Auditing. For
more information, see Auditing with XDASv2 and
Using XDASv2 for Auditing NMAS Events respectively.
NOTE: Prior to eDirectory 8.8.8 P9,
DSE_LDAP_CONNECTION
event is used to monitor the
Create Session event.
DSE_LOGIN_EX
TERMINATE_SESSION DSE_LOGOUT
MODIFY_SESSION
For an example of this event, see “Modify Session” on
page 41.
DSE_CHANGE_CONN_STATE
CREATE_DATA_ITEM
For an example of this event, see “Create Data Item”
on page 44.
DSE_CREATE_BACKLINK
DSE_CREATE_ENTRY
DSE_CREATE_SUBREF
DSE_LDAP_ADD
DSE_LDAP_ADDRESPONSE
DSE_NAME_COLLISION
DSE_SPLIT_DONE
DSE_SPLIT_PARTITION
XDAS Event eDirectory Event
20 NetIQ XDASv2 Administration Guide
DELETE_DATA_ITEM
For an example of this event, see “Delete Data Item”
on page 45.
DSE_DELETE_ENTRY
DSE_JOIN_PARTITIONS
DSE_LDAP_DELETE
DSE_LDAP_DELETERESPONSE
DSE_MOVE_SOURCE_ENTRY
DSE_REMOVE_ENTRY
DSE_REMOVE_ENTRY_DIR
DSE_REMOTE_SERVER_DOWN
XDAS Event eDirectory Event
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70

Novell eDirectory 8.8 Administration Guide

Type
Administration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI