Security logs provide security details for individual applications, application connections, and users. Logs capture authentication failures and errors, and provide supporting information that identifies request-response messaging, package and MBO details, security configuration, and the thread and node that attempted to process an authentication request.
- Time – the
time and date stamp for the log entry.
- Application ID – the unique identifier assigned to the registered application. Values may include a number, blank, or HWC, depending on the client type.
- Application Connection ID – the unique identifier for a user application connection.
- User – the name of the user associated with the application ID.
- Correlation ID – the unique ID associated with every request-response message pair.
- Package – the name of the package to which the subscription belongs.
- MBO – the
mobile business object used.
- Security Configuration – the associated security
configuration.
- Method – the MBO operation
used.
- Thread ID – the identifier for the thread used to process the
request.
- Node ID – the server node on which the request is received.
- Outcome – the authentication outcome for
the security check.
- Reason – the reason for authentication
failure.
- Error – the error message if any.
- Transaction ID – a unique ID that represents a
transaction (one cycle of request-response) performed by the client or
application.
- Root Context ID – a unique ID that represents a
client/server session. A session can be thought of as a block that includes
multiple requests from the client to the server.