Security Log

Security logs provide security details for individual applications, application connections, and users. Logs capture authentication failures and errors, and provide supporting information that identifies request-response messaging, package and MBO details, security configuration, and the thread and node that attempted to process an authentication request.

  • Time – the time and date stamp for the log entry.
  • Application ID – the unique identifier assigned to the registered application. Values may include a number, blank, or HWC, depending on the client type.
  • Application Connection ID – the unique identifier for a user application connection.
  • User – the name of the user associated with the application ID.
  • Correlation ID – the unique ID associated with every request-response message pair.
  • Package – the name of the package to which the subscription belongs.
  • MBO – the mobile business object used.
  • Security Configuration – the associated security configuration.
  • Method – the MBO operation used.
  • Thread ID – the identifier for the thread used to process the request.
  • Node ID – the server node on which the request is received.
  • Outcome – the authentication outcome for the security check.
  • Reason – the reason for authentication failure.
  • Error – the error message if any.