The Security Audit Log records activities in the system that are considered important for auditing and security purposes. This includes the following actions in Read Access Logging (RAL):
When these actions are performed, corresponding entries are recorded in the Security Audit Log, including the user and time.
The following codes are used in the Message text field for RAL-specific log entries:
Actions | Description |
---|---|
C | Create |
R | Read |
U | Update |
D | Delete |
Types | Description |
---|---|
P | Logging purpose |
D | Log domain |
R | Recording |
C | Configuration |
B | User exclusion list |
S | Enabling in client |
L | Read access log |
Message text | Description |
---|---|
RAL Log Access: Action: R | The read access log was viewed. |
RAL Configuration Access: Action: U, Type C, Banking1 | The Banking1 configuration was changed. |