Logging
and Tracing
The following files are available for logging important security events and helping administrators with troubleshooting:
· Security Logging
Location in Log Viewer: ./log/system/security.<n>.log
Location in file system: <drive>:\usr\sap\<SID>\<instance_number>\j2ee\cluster\server<n>\log\system\security.<n>.log
This file contains the log entries of a number of security related services, including the following:
¡ Authentication
¡ User Management
¡ Virus Scanner Interface
¡ Web Services
¡ Destination service
● Security Audit
Location in Log Viewer: ./log/system/security_audit.log
Location in file system: <drive>:\usr\sap\<SID>\<instance_number>\j2ee\cluster\server<n>\log\system\security_audit.log
This file contains a log of important security events, such as successful and failed user logons, and creation or modification of users, groups and roles. For a complete list of events that are logged and the format in which they are logged, see What is Logged?.
● Trace Files
Location in Log Viewer: ./log/defaultTrace.<n>.trc
Location in file system: <drive>:\usr\sap\<SID>\<instance_number>\j2ee\cluster\serverX\log\defaultTrace.<n>.trc
This file contains all the trace information for the whole server and includes trace information for user management engine (UME) libraries and the UME provider (com.sap.security.core.ume.service). The information in this file is on a fine-granular level and includes exceptions, warnings, and debugging information. It is mainly required by SAP support.
● Directory Server Logging
When you use an LDAP directory server as a data source for the UME, you can configure log files to monitor and troubleshoot the connections.
More information:
¡ Directory Server Connection Pool Log
Use SAP NetWeaver Administrator to view log and trace files.
More information:
Log Viewer
For more information about viewing the specific
predefined security view, see
Specific Predefined Security
View.
...
Use SAP NetWeaver Administrator to configure log and trace files.
More information:
Configuring Log
Controllers
Use UME properties to configure what is logged. The table below lists the configuration options.
More information: Editing UME Properties
Configuration Options for Security Logging
Option |
UME Property |
Log the object ID of an event |
ume.secaudit.get_object_name |
Disable the logging of the actor of an event, only anonymous is recorded |
ume.secaudit.log_actor |
Disable the logging of the client host address |
ume.security_policy.log_client_hostaddress |
Log the client hostname |
ume.security_policy.log_client_hostname |