Reading the extrainfo column

The extrainfo column contains a sequence of data separated by semicolons. The data is organized in the following categories.

Table 18-4: Information in the extrainfo column

Position

Category

Description

1

Roles

A list of active roles, separated by blanks.

2

Keywords or Options

The name of the keyword or option that was used for the event. For example, for the alter table command, the add column or drop constraint options might have been used. If multiple keywords or options are listed, they are separated by commas.

3

Previous value

If the event resulted in the update of a value, this item contains the value prior to the update.

4

Current value

If the event resulted in the update of a value, this item contains the new value.

5

Other information

Additional security-relevant information that is recorded for the event.

6

Proxy information

The original login name if the event occurred while a set proxy was in effect.

7

Principal name

The principal name from the underlying security mechanism if the user’s login is the secure default login, and the user logged in to Adaptive Server via unified login. The value of this item is NULL if the secure default login is not being used.

This example shows an extrainfo column entry for the event of changing an auditing configuration parameter.

sso_role;suspend audit when device full;1;0;;ralph;

This entry indicates that a system security officer changed suspend audit when device full from 1 to 0. There is no “other information” for this entry. The sixth category indicates that the user “ralph” was operating with a proxy login. No principal name is provided.

The other fields in the audit record give other pertinent information. For example, the record contains the server user ID (suid) and the login name (loginname).

Table 18-5 lists the values that appear in the event column, arranged by sp_audit option. The “Information in extrainfo” column describes information that might appear in the extrainfo column of an audit table, based on the categories described in Table 18-4.

Table 18-5: Values in event and extrainfo columns

Audit option

Command or access to be audited

event

Information in extrainfo

(Automatically audited event not controlled by an option)

Enabling auditing with: sp_configure auditing

73

(Automatically audited event not controlled by an option)

Disabling auditing with: sp_configure auditing

74

Unlocking Administrator’s account

Disabling auditing with: sp_configure auditing

74

adhoc

User-defined audit record

1

extrainfo is filled by the text parameter of sp_addauditrecord

alter

alter database

2

Subcommand keywords:

  • alter maxhold

  • alter size

    inmemory

alter table

3

Subcommand keywords:

  • add/drop/modify column

  • replace columns

  • replace decrypt default

  • replace/add decrypt default

  • add constraint

  • drop constraint

If one or more encrypted columns are added, extrainfo contains: add/drop/modify column column1/keyname1, [,column2/keyname2] where keyname is the fully qualified name of the key.

bcp

bcp in

4

bind

sp_bindefault

6

Other information: Name of the default

sp_bindmsg

7

Other information: Message ID

sp_bindrule

8

Other information: Name of the rule

all, create

create database

9

Keywords or options: inmemory

cmdtext

All commands

92

Full text of command, as sent by the client

create

create database

9

create default

14

create procedure

11

create rule

13

create table

10

For encrypted columns, extrainfo contains column names and keynames. EK column1/keyname1[,column2 keyname2]

where EK is a prefix indicating that subsequent information refers to encryption keys and keyname is the fully qualified name of the key.

create trigger

12

create view

16

create index

104

Other information: Name of the index

create function

97

sp_addmessage

15

Other information: Message number

dbaccess

Any access to the database by any user

17

Keywords or options:

  • use cmd

  • outside reference

dbcc

dbcc all keywords

81

Keywords or options: Any of the dbcc keywords such as checkstorage and the options for that keyword.

delete

delete from a table

18

Keywords or options: delete

delete from a view

19

Keywords or options: delete

disk

disk init

20

Keywords or options: disk init

Other information: Name of the disk

disk mirror

23

Keywords or options: disk mirror

Other information: Name of the disk

disk refit

21

Keywords or options: disk refit

Other information: Name of the disk

disk reinit

22

Keywords or options: disk reinit

Other information: Name of the disk

disk release

87

Keywords or options: disk release

Other information: Name of the disk

disk remirror

25

Keywords or options: disk remirror

Other information: Name of the disk

disk unmirror

24

Keywords or options: disk unmirror

Other information: Name of the disk

disk resize

100

Keywords or options: disk resize

Other information: Name of the disk

drop

drop database

26

drop default

31

drop procedure

28

drop table

27

drop trigger

29

drop rule

30

drop view

33

drop index

105

Other information: Index name

drop function

98

sp_dropmessage

32

Other information: Message number

dump

dump database

34

dump transaction

35

encryption_key

sp_encryption

106

If password is set the first time:

ENCR_ADMIN system_encr_passwd password ********

If the password is subsequently changed:

ENCR_ADMIN system_encr_passwd password ******** ********

create encryption key

107

Keywords contain:

algorithm name-bitlength/IV [random|NULL]/pad [random |NULL] user/system

For example:

AES-128/IV RANDOM/PAD NULL USER

alter encryption key

108

default/not default

drop encryption key

109

AEK modify encryption

118

modify encryption
with user passwd
| for user username
	{with login passwd
	| with user passwd
	| with keyvalue}
	[for recovery

Note that keyvalue is displayed only for replication of alter encryption key modify encryption. For example, when user “stephen” modifies his key copy, the following information is saved:

MODIFY ENCRYPTION for user stephen WITH USER PASSWD

AEK add encryption

119

add encryption for user user_name
for login association | recovery|with keyvalue]

Note that keyvalue is displayed only for replication of alter encryption key add encryption.

alter encryption key drop encryption

120

drop encryption [for recovery | for user user_name

See the Encrypted Columns Users Guide.

alter encryption key modify owner

121

modify owner [new owner user_name]

See the Encrypted Columns Users Guide.

alter encryption key recover key

122

recovery key [with key_value]

with keyvalue is only used during replication of alter encryption key

See the Encrypted Columns Users Guide.

errorlog

errorlog or errorlog_admin function

127

The parameters passed to errorlog_admin are logged to identify the subcommand: errorlog_admin (param1, param2,...).

errors

Fatal error

36

Other information: Error number.Severity.State

Non-fatal error

37

Other information: Error number.Severity.State

exec_procedure

Execution of a procedure

38

Other information: All input parameters

exec_trigger

Execution of a trigger

39

func_obj_access, func_dbaccess

Accesses to objects and databases via Transact-SQL functions. (Auditing must be enabled for the sa_role to audit functions).

86

grant

grant

40

insert

insert into a table

41

Keywords or option:

  • If insert is used: insert

  • If select into is used: insert into followed by the fully qualified object name

insert into a view

42

Keywords or options: insert

install

install

93

load

load database

43

load transaction

44

login

Any login to the server

45

Other information:

  • Host name and IP address of the machinefrom which the login was performed.

  • Error number.Severity.State for failed logins.

login_locked

Login locked due to exceeding the configured number of failed login attempts

112

logout

Any logouts from the server

46

Other information: Host name

mount

mount database

101

password

sp_passwordpolicy and all its actions except list.

115

Parameters for sp_passwordpolicy

quiesce

quiesce database

96

reference

Creation of references to tables

91

Keywords or options: reference

Other information: Name of the referencing table

remove

remove java

94

revoke

revoke

47

rpc

Remote procedure call from another server

48

Keywords or options: Name of client program

Other information: Server name, host name of the machine from which the RPC was executed.

Remote procedure call to another server

49

Keywords or options: Procedure name

security

connect to (CIS only)

90

Keywords or options: connect to

online database

83

proc_role function (executed from within a system procedure)

80

Other information: Required roles

Regeneration of a password by an sso

76

Keywords or options: Setting SSO password

Other information: Login name

Role toggling

55

Previous value: on or off

Current value: on or off

Other information: Name of the role being set

Server start

50

Other information:

  • -dmasterdevicename

  • -iinterfaces file path

  • -Sservername

  • -eerrorfilename

sp_webservices

111

Keywords or options: deploy if deploying a web service. deploy_all if deploying all web services

sp_webservices

111

Keywords or options: undeploy if undeploying a web service. undeploy_all if undeploying all web services

Server shutdown

51

Keywords or options: shutdown

set proxy or set session authorization

88

Previous value: Previous suid Current value: New suid

sp_configure

82

Keywords or options: SETCONFIG

Other information:

  • If a parameter is being set: number of configuration parameter

  • If a configuration file is being used to set parameters: name of the configuration file

sp_ssladmin administration enabled

99

Keywords contains SSL_ADMIN addcert, if adding a certification.

Audit table access

61

create login, drop login

103

Keywords or options: create login, drop login

create, drop, alter, grant, or revoke role

85

Keywords or options: create, drop, alter, grant, or revoke role

built-in functions

86

Keywords or options: Name of function

Security command or access to be audited, specifically, starting Adaptive Server with -u option to unlock the administrator’s account..

95

Other information contains 'Unlocking admin account'

Changes to the LDAP state changes

123

Keywords or options: Primary URL state and secondary URL state

  • Previous value

  • Current value

Additional information indicates whether the state change happened automatically or because of a manually entered command.

The regeneration of asymmetric keypairs for network password encryption by the system or sp_passwordpolicy

117

Information in extrainfo

select

select from a table

62

Keywords or options:

  • select into

  • select

  • readtext

select from a view

63

Keywords or options:

  • select into

  • select

  • readtext

setuser

setuser

84

Other information: Name of the user being set

table_access

delete

18

Keywords or options: delete

insert

41

Keywords or options: insert

select

62

Keywords or options:

  • select into

  • select

  • readtext

update

70

Keywords or options:

  • update

  • writetext

truncate

truncate table

64

transfer_table

transfer table

136

transfer table

unbind

sp_unbindefault

67

sp_unbindmsg

69

sp_unbindrule

68

unmount

unmount database

102

create manifest file

116

Information in extrainfo

update

update to a table

70

Keywords or options:

  • update

  • writetext

update to a view

71

Keywords or options:

  • update

  • writetext

view_access

delete

19

Keywords or options: delete

insert

42

Keywords or options: insert

select

63

Keywords or options:

  • select into

  • select

  • readtext

update

71

Keywords or options:

  • update

  • writetext

Table 18-6 lists the values that appear in the event column, arranged by the audit event.

Table 18-6: Audit event values

Audit event ID

Command name

Audit event ID

Command name

1

ad hoc audit record

62

select table

2

alter database

63

select view

3

alter table

64

truncate table

4

bcp in

65

Reserved

5

Reserved

66

Reserved

6

bind default

67

unbind default

7

bind message

68

unbind rule

8

bind rule

69

unbind message

9

create database

70

update table

10

create table

71

update view

11

create procedure

72

Reserved

12

create trigger

73

auditing enabled

13

create rule

74

auditing disabled

14

create default

75

Reserved

15

create message

76

SSO changed password

16

create view

77

Reserved

17

access to database

78

Reserved

18

delete table

79

Reserved

19

delete view

80

role check performed

20

disk init

81

dbcc

21

disk refit

82

config

22

disk reinit

83

online database

23

disk mirror

84

setuser command

24

disk unmirror

85

UDR command

25

disk remirror

86

built-in function

26

drop database

87

Disk release

27

drop table

88

set SSA command

28

drop procedure

89

kill or terminate command

29

drop trigger

90

connect

30

drop rule

91

reference

31

drop default

92

command text

32

drop message

93

JCS install command

33

drop view

94

JCS remove command

34

dump database

95

Unlock admin account

35

dump transaction

96

quiesce database

36

Fatal error

97

create SQLJ function

37

Non-fatal error

98

drop SQLJ function

38

execution of stored procedure

99

SSL administration

39

Execution of trigger

100

disk resize

40

grant

101

mount database

41

insert table

102

unmount database

42

insert view

103

login command

43

load database

104

create index

44

load transaction

105

drop index

45

login

106

sp_encryption (encrypted column administration)

46

logout

107

create encryption key

47

revoke

108

Alter Encryption Key as/not default

48

rpc in

109

drop encryption key

49

rpc out

110 111

deploy user-defined web services undeploy user defined web services

50

server boot

112

login has been locked

51

server shutdown

113

quiesce hold security

52

Reserved

114

quiesce release

53

Reserved

115

Password administration

54

Reserved

116

create manifest file

55

role toggling

117

regenerate keypair

56

Reserved

118

alter encryptin key modify encryption

57

Reserved

119

alter encryption key add encryption

58

Reserved

120

alter encryption key drop encryption

59

Reserved

121

alter encryption key modify owner

60

Reserved

122

alter encryption key for key recovery

61

access to audit table

123

LDAP state changes

127

Errorlog administration

136

transfer table