!!! Overview[1] %%zebra-table %%sortable %%table-filter ||Category||Event Name||[XDAS ID|XDAS Event Identifier]||[eDirectory Event Type]||Description||Usage |[Account Management|XDAS Account Management]|[CREATE_ACCOUNT]|0.0.0.0|[DSE_CREATE_ENTRY]|Create a new account|Consider this event as appropriate for any situation wherein an account, as defined above, is to be created. |[Account Management|XDAS Account Management]|[DELETE_ACCOUNT]|0.0.0.1|[DSE_DELETE_ENTRY]|Delete an existing account|This event has the opposite semantic meaning of account creation. Use this event wherever such an account, as described above, is to be deleted. |[Account Management|XDAS Account Management]|Disable Account|0.0.0.2|DSE_LOGIN|Disable an existing account|Consider this event relevant for any situation where a particular record in an identifier database is disabled by an administrator or an automated security process such that it can no longer be used until it is re-enabled |[Account Management|XDAS Account Management]|Enable Account|0.0.0.3| |Enable an existing account|This is the counterpart event to the disable account event defined above. |[Account Management|XDAS Account Management]|Query Account|0.0.0.4|DSE_SEARCH|Query an existing account|Consider the Query account events whenever a request for the attribute information of a particular account is made. |[Account Management|XDAS Account Management]|Modify Account|0.0.0.5|DSE_MERGE_ENTRIES|Modify an existing account|Consider the Modify account events whenever a request to change attribute information of a particular account is made. |[Account Management|XDAS Account Management]|Modify Account Security Token|0.0.0.6|DSE_CHGPASS|Modify an existing account security token|An account security token may be a password, or any other type of authentication materials associated with a user account. Here, a user account means any type of account by which a user, application, or system service may authenticate, and then act with the rights of that account. |[Session Management|XDAS Session Management]|[CREATE_SESSION]|0.0.1.0| |Create a new session|This event should be reported whenever a new session (as defined above) is created. |[Session Management|XDAS Session Management]|[TERMINATE_SESSION]|0.0.1.1| |Terminate an existing session|This event should be reported whenever an existing session (as defined above) is terminated. |[Session Management|XDAS Session Management]|Query Session|0.0.1.2| |Query user session attributes|This event should be reported whenever attribute information is requested on an existing session. |[Session Management|XDAS Session Management]|Modify Session|0.0.1.3|DSE_CHANGE_CONN_STATE|Modify user session attributes|This event should be reported whenever attribute information is modified on an existing session. |[Data-Resource Management|XDAS Data Item Management Events]|Create Data Item|0.0.2.0|[DSE_CREATE_ENTRY]|Create a data item|This event is reported whenever a security-relevant data item or resource element is created. |[Data-Resource Management|XDAS Data Item Management Events]|Delete Data Item|0.0.2.1|[DSE_DELETE_ENTRY]|Delete a data item|This event is reported whenever a security-relevant data item or resource element is deleted |[Data-Resource Management|XDAS Data Item Management Events]|Query Data Item Attribute|0.0.2.2|DSE_COMPARE_ATTR_VALUE|Query data item attributes|This event is reported whenever a security-relevant data item or resource element is queried – either for value, or for an attribute of the data item. |[Data-Resource Management|XDAS Data Item Management Events]|Modify Data Item Attribute|0.0.2.3|DSE_DEFINE_ATTR_DEF \\DSE_REMOVE_ATTR_DEF\\DSE_REMOVE_CLASS_DEF\\DSE_DEFINE_CLASS_DEF\\DSE_MODIFY_CLASS_DEF|Modify data item attributes|This event is reported whenever a security-relevant data item or resource element is modified – either the value, or an attribute of the data item |[Service Management|XDAS Service Management]|Install Service|0.0.3.0|DSE_CHANGE_MODULE_STATE|Install a service or application|This event is reported when a service or application is installed |[Service Management|XDAS Service Management]|Remove Service|0.0.3.1|DSE_CHANGE_MODULE_STATE|Remove a service or application|This event is reported when a service or application is removed. |[Service Management|XDAS Service Management]|Query Service Configuration|0.0.3.2| |Query the configuration of a service or application|This event is reported when service or application configuration information is requested. |[Service Management|XDAS Service Management]|Modify Service Configuration|0.0.3.3| |Modify configuration of a service or application|This event is reported when service or application configuration information is modified. |[Service Management|XDAS Service Management]|Disable Service|0.0.3.4|DSE_CLOSE_BINDERY|Disable a service or application|This event is reported when a service, operation or function is disabled. |[Service Management|XDAS Service Management]|Enable Service|0.0.3.5|DSE_OPEN_BINDERY|Enable a service or application|This event ise reported when a service, operation or function is enabled. |[Service Utilization|XDAS Service Utilization]|Invoke Service|0.0.4.0|DSE_START_UPDATE_SCHEMA|Invoke a service or application|This event is reported when a security-relevant service is invoked. |[Service Utilization|XDAS Service Utilization]|Terminate Service|0.0.4.1|DSE_END_UPDATE_SCHEMA|Terminate a service or application|This event is reported when a service is terminated. |[Service Utilization|XDAS Service Utilization]|Query Process Context|0.0.4.2| |Query a processing context|This event is reported when any attributes of a process context are queried – this event is somewhat specific to operating systems, but some use can be found in other domain-specific applications. |[Service Utilization|XDAS Service Utilization]|Modify Process Context|0.0.4.3|DSE_SERVER_RENAME\\DSE_SYNTHETIC_TIME\\DSE_SERVER_ADDRESS_CHANGE|Modify processing context|This event is reported when any attributes of a process context are modified – this event is somewhat specific to operating systems, but some use can be found in other domain-specific applications. |[Peer Association|XDAS Peer Association]|Create Peer Association|0.0.5.0| |Create an association with a peer|This event is reported when a new peer association is created. |[Peer Association|XDAS Peer Association]|Terminate Peer Association|0.0.5.1| |Terminate an association with a peer|This event is reported when an existing peer association is destroyed. |[Peer Association|XDAS Peer Association]|Query Association Context|0.0.5.2| |Query an association context|This event is reported when the attributes of a peer association are queried. |[Peer Association|XDAS Peer Association]|Modify Association Context|0.0.5.3| |Modify an association context|This event is reported when the attributes of a peer association are modified. |[Peer Association|XDAS Peer Association]|Receive Data Via Association|0.0.5.4| |Receive data via an association|This event is reported when data is received from a service in an authentication domain specifically via a trust relationship or peer association. |[Peer Association|XDAS Peer Association]|Send Data Via Association|0.0.5.5| |Send data via an association|This event is reported when data is sent to a service in an authentication domain specifically via a trust relationship or peer association. |[Resource Access|XDAS Resource Access]|Create Data Item Association|0.0.6.0| |Create association with a data item|This event is reported when rights are granted by an identity to a specific data item – when a trust relationship is established between an identity and a data item. |[Resource Access|XDAS Resource Access]|Terminate Data Item Association|0.0.6.1| |Terminate association with a data item|This event is reported when rights are revoked from an identity to a specific data item – when a trust relationship is revoked between an identity and a data item. |[Resource Access|XDAS Resource Access]|Query Data Item Association|0.0.6.2| |Query context of association with a data item|This event is reported when rights are queried for an identity on a specific data item – when trust relationship attributes are queried for a specific identity and data item. |[Resource Access|XDAS Resource Access]|Modify Data Item Association|0.0.6.3| |Modify context of association with data item|This event is reported when rights are modified on the previously established relationship between an identity and specific data item. |[Resource Access|XDAS Resource Access]|Query Data Item Contents|0.0.6.4| |Query data item contents|This event is reported when a data item is read on behalf of an identity. |[Resource Access|XDAS Resource Access]|Modify Data Item Contents|0.0.6.5| |Modify data item contents|This event is reported when a data item is written on behalf of an identity. |[Workflow management|XDAS Workflow management]|[GRANT_ACCOUNT_ACCESS]|0.0.7.0| |Initiate a request for [Permission]|Approval for a [Permission] item has been requested. |[Workflow management|XDAS Workflow management]|Receive Work Flow Approval|0.0.7.1| |Receive a work flow approval notice|Approval for a work flow item has been received by appropriate authority. |[Workflow management|XDAS Workflow management]|Escalate Work Flow Request|0.0.7.2| |A work flow item was escalated|A work flow request has been escalated. |[Workflow management|XDAS Workflow management]|Send Work Flow Notification|0.0.7.3| |A work flow notification was sent|Sent a work flow change notification. |[Role Management|XDAS Role Management]|Create Role|0.0.8.0| |Create a new role|Creates a new role, or an attempt is made to create a new role. |[Role Management|XDAS Role Management]|Delete Role|0.0.8.1| |Delete an existing role|An existing role is deleted, or an attempt is made to delete an existing role. |[Role Management|XDAS Role Management]|Disable Role|0.0.8.2| |Disable an existing role|An existing role is disabled, or an attempt is made to disable an existing role. |[Role Management|XDAS Role Management]|Enable Role|0.0.8.3| |Enable an existing role|A previously disabled role is re-enabled, or an attempt is made to enable a previously disabled role. |[Role Management|XDAS Role Management]|Query Role|0.0.8.4| |Query role attributes|Role attributes are queried, or an attempt is made to query role attributes. |[Role Management|XDAS Role Management]|Modify Role|0.0.8.5| |Modify a role attribute|Role attributes are modified, or an attempt is made to modify role attributes. |[Exceptional Events|XDAS Exceptional Events]|Start System|0.0.9.0| |Start a system|This event is reported when a server, system, or mission-critical application starts up. |[Exceptional Events|XDAS Exceptional Events]|Shutdown System|0.0.9.1| |Shutdown a system|This event is reported when a server, system, or mission critical application shuts down. |[Exceptional Events|XDAS Exceptional Events]|Resource Exhaustion|0.0.9.2| |Resource exhaustion|This event is reported when a server, system, or mission critical application runs out of some critical resource, like memory or disk space. It is often difficult to report such events because often the critical resource in question is required in order to report the event. |[Exceptional Events|XDAS Exceptional Events]|Resource Corruption|0.0.9.3| |Resource Corruption|This event is reported when a server, system, or mission critical application detects a resource corruption (memory, disk file, etc). |[Exceptional Events|XDAS Exceptional Events]|Resource Unavailable|0.0.9.4| |Resource Unavailable|This event is reported when a server, system, or mission critical application becomes unavailable. |[Exceptional Events|XDAS Exceptional Events]|Resource Available|0.0.9.5| |Resource Available|This event is reported when a server, system, or mission critical application becomes available. This event is usually reported if the resource has been unavailable for a period of time. |[Exceptional Events|XDAS Exceptional Events]|Back up Data Store|0.0.9.6| |Back up Data Store|This event is reported when a server, system, or mission critical application backs up a critical data store. |[Exceptional Events|XDAS Exceptional Events]|Recover Data Store|0.0.9.7| |Recover Data Store|This event is reported when a server, system, or mission critical application restores a critical data store. |[Audit Service|XDAS Audit Service]|Configure Audit Service|0.0.10.0| |Configure audit service|Configuration data has been changed for an audit subsystem. OpenXDAS reports this event when a SIGHUP is received, indicating that the xdasd configuration file has been modified and should be re-read. |[Audit Service|XDAS Audit Service]|Audit Data Store Full|0.0.10.1| |Audit datastore is full|This event is reported by OpenXDAS when an audit log is full, and can no longer accept additional audit records. Where possible, space is reserved for this event, in case it must be reported. |[Audit Service|XDAS Audit Service]|Audit Data Store Corrupted|0.0.10.2| |Audit datastore is corrupted|This event is reported by OpenXDAS when the data store reports that an audit log has been corrupted. Generally, this condition is not detected unless a request is made to read an audit stream, and the audit log reports that it cannot be read due to corruption. |[Authentications|XDAS Authentications]|Authenticate Session|0.0.11.0| |A new identity is associated with a session|When a user authenticates a session, a new identity is associated with that session. This identity is then used to authorize requests for protected resources. |[Authentications|XDAS Authentications]|Unauthenticate Session|0.0.11.1| |A user has actively disassociated his identity from an existing authenticate session.|When a user clicks the “Logout” button on his or her web browser, the previously authenticated identity is removed from an existing authenticated session. |[Authentications|XDAS Authentications]|Federate Identity|0.0.11.2| |A remote identity is associated with a local identity.|An identity relationship is established between a user at XYZ.COM and the local identity provider. |[Authentications|XDAS Authentications]|Unfederate Identity|0.0.11.3| |A remote identity is disassociated from a local identity.|An existing identity relationship between a user at an external identity provider and the local identity provider is removed. |[Authentications|XDAS Authentications]|Create Access Token|0.0.11.4| |A SAMLv2, WS-*, OAuth, or other access token was provided upon request.|A resource access token was created by a service (or identity) provider to send to a service consumer. Access is limited by time frame, specifically requested resources, or other limiting criteria, in terms of a contract specified by previously agreed upon name/value pairs in the token. The act of creating and sending an access token is the start of a new pseudo-identity with limited and specific rights to protected resources. This pseudo-identity can be used as a correlation identifier between this and future authorization events. The actually identity of the system user behind the access token may or may not be hidden from the consumer. |[Authentications|XDAS Authentications]|Destroy Access Token|0.0.11.5| |An existing SAMLv2, WS-*, OAuth, or other access token was destroyed or decommissioned.|A previously created access token was decommissioned such that it is no longer allowed to be used for access to protected resources. Future requests for access to protected resources, based on this access token should be denied. /% /% /% !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [XDASv2 for eDirectory, IDM, and NMAS v1|http://www.novell.com/documentation//edir88/edirxdas_admin/data/bqs7jv2.html|target='_blank'] - based on information retrieved 2013-06-27