145 viewing the activity log section, 233 128 activity log section components – HP Secure Key Manager User Manual

Page 233

Advertising
background image

Table 127 Values for the Detail Field in the Activity Log

Request Type

Detail Information

authentication

username provided by the client

key generation

algorithm and key size; the value for the Deletable and Exportable options are listed

as well if they are set by the client

key import

algorithm and key size specified in the request; the value for the Deletable and

Exportable options are listed as well if they are set by the client

key deletion

nothing is listed in the detail field

key export

nothing is listed in the detail field

random number

generation

size in bytes of the random number being generated

replication export

nothing is listed in the detail field

replication import

nothing is listed in the detail field

key information

nothing is listed in the detail field

key queries

nothing is listed in the detail field

cryptographic

ordinal number of the operation, the name of the operation, and the algorithm

(including mode and padding)

The following graphic shows an example of the Activity Log section.

Figure 145 Viewing the Activity Log section

The following table describes the components of the Activity Log section.

Table 128 Activity Log section components

Component

Description

Log File

Select older logs to display.

Show Last Number

of Lines

Select the number of log entries to view.

Wrap Lines

Select to wrap text in the display area.

Display Log

Click Display Log to display the specified number of lines of the log.

Rotate Logs

Click Rotate Logs to close current log and start a new log.

Current Activity Log

Secure Key Manager

233

Advertising