About logs
Type | Description |
---|---|
Access |
Messages about clients accessing the server. Each message includes a datestamp, information about the connection, and information about the operation. DS servers implement access logs for HTTP and LDAP. It is possible to configure multiple access logs at the same time. Do not enable multiple unfiltered file-based access loggers for the same protocol, however. This can put significant write load on the disk subsystem for access log files, because every client request results in at least one new log message. |
Audit |
Records changes to directory data in LDIF. DS servers implement an audit log as a special type of file-based access log.
By default, the server writes messages to For an example, refer to Enable an audit log. |
Error |
Messages tracing server events, error conditions, and warnings, categorized and identified by severity. By default, this is a file-based log, written to Messages have the following format: [datestamp] category=category severity=severity msgID=ID number msg=message string For lists of server messages by category, refer to Log message reference. DS error log message severity levels are:
To log debug-level messages for a category of interest, refer to Debug-level logging. Use the external changelog to get notifications about changes to directory data. For details, refer to Changelog for notifications. |
Server |
Messages about server events since startup. This is a file-based log, written to Messages in this file have the same format as error log messages. |
You configure logging using log publishers. Log publishers determine which messages to publish, where to publish them, and what output format to use.
DS server logging supports extensibility through a common audit event framework. The framework deals with any event you can audit, not only the data updates recorded in a directory audit log. The framework provides log handlers for publishing to local files or to remote systems.
Access log format
DS servers support a common audit event framework. The log message formats are compatible for all products using the framework. The framework uses transaction IDs to correlate requests as they traverse the platform. This makes it easier to monitor activity and to enrich reports:
-
The framework is built on audit event handlers. Audit event handlers can encapsulate their own configurations. Audit event handlers are the same in each product in the Ping Identity Platform. You can plug in custom handlers that comply with the framework without having to upgrade the server.
-
The framework includes handlers for logging to local files and to external services.
Although the framework supports multiple topics, DS software currently supports handling only access events. DS software divides access events into
ldap-access
events andhttp-access
events. -
Common audit transaction IDs are not recorded by default. To record transaction IDs in the access logs, configure the DS server to trust them.
LDAP events have the following format:
{
"eventName": "DJ-LDAP",
"client": {
"ip": string, // Client IP address
"port": number // Client port number
},
"server": {
"ip": string, // Server IP address
"port": number // Server port number
},
"request": { // LDAP request
"attrs": [ string ], // Requested attributes
"authType": string, // Bind type such as "SIMPLE"
"connId": number, // Connection ID
"controls": [{ // Request controls
"control": string, // Control name or OID
"critical": boolean, // true, false
"value": string // Base64-encoded
}],
"deleteOldRDN": boolean, // For a modify DN request
"dn": string, // Bind DN
"filter": string, // Search filter
"idToAbandon": number, // ID to use to abandon operation
"message": string, // Localized request message
"modifications": [{ // Attributes targeted for modification1
"modification": string, // Modification type
"attribute": string, // Targeted attribute
"values": [ string ] // Modification values
}]
"msgId": number, // Message ID
"name": string, // Operation name
"newRDN": string, // For a modify DN request
"newSup": string, // For a modify DN request
"oid": string, // Operation name or OID
"operation": string, // Examples: "CONNECT", "BIND", "SEARCH", "TLS"
"opType": "sync", // Replication operation
"protocol": string, // "LDAP", "LDAPS"
"runAs": string, // Authorization ID
"scope": string, // Search scope such as "sub"
"version": string // Version "2", "3"
},
"response": {
"additionalItems": object // Additional information
"controls": [{ // Response controls
"control": string, // Control name or OID
"critical": boolean // true, false
}],
"elapsedTime": number, // Total time queuing and processing the request
"elapsedQueueingTime": number, // Time the request spent waiting in the queue
"elapsedProcessingTime": number, // Time actively processing the request
"elapsedTimeUnits": string, // Time unit such as "MILLISECONDS"
"entrySize": number, // Size in bytes of the largest entry
// read from disk while processing
// the operation
"failureReason": string, // Human-readable information
"maskedMessage": string, // Real, masked result message
"maskedResult": string, // Real, masked result code
"nentries": number, // Number of entries returned
"reason": string, // Reason for disconnect
"status": string, // "SUCCESSFUL", "FAILED"
"statusCode": string // For example, "0" for success
},
"security": { // Connection security, such as TLS handshake data
"protocol": string, // Protocol, such as "TLSv1.3"
"cipher": string, // Cipher suite
"ssf": number // Security strength factor
},
"timestamp": string, // UTC date
"transactionId": string, // Unique ID for the transaction
"userId": string, // User who requested the operation
"_id": string // Unique ID for the operation
}
1 When the advanced configuration property for the log publisher log-modified-attribute-values:true
,
DS logs an array of attributes targeted by modification requests.
Each item indicates:
-
The modification type:
add
,delete
,increment
, orreplace
. -
The attribute name.
-
The values for the modification, if allowed according to the log publisher configuration.
Set one of the advanced attributes
exclude-values-of-attributes
orinclude-values-of-attributes
to specify which attribute values DS logs.
HTTP events have the following format:
{
"eventName": "DJ-HTTP",
"client": {
"ip": string, // Client IP address
"port": number // Client port number
},
"server": {
"ip": string, // Server IP address
"port": number // Server port number
},
"http": { // HTTP request and response
"request": {
"secure": boolean, // HTTP: false; HTTPS: true
"method": string, // Examples: "GET", "POST", "PUT"
"path": string, // URL
"queryParameters": map, // map: { key-string: [ value-string ] }
"cookies": map // map: { key-string: [ value-string ] }
},
"response": {
"headers": map // map: { key-string: [ value-string ] }
}
},
"response": {
"detail": string, // Human-readable information
"elapsedTime": number, // Total time queuing and processing the request
"elapsedTimeUnits": string, // Time unit such as "MILLISECONDS"
"status": string, // "SUCCESSFUL", "FAILED"
"statusCode": string // For example, "0" for success
},
"timestamp": string, // UTC date
"transactionId": string, // Unique ID for the transaction
"trackingIds": [ string ], // Unique IDs from the transaction context
"userId": string, // User who requested the operation
"_id": string // Unique ID for the operation
}
Access log filtering
With the default access log configuration (no filtering), for every client application request, the server writes at least one message to its access log. This volume of logging gives you the information to analyze overall access patterns, or to audit access when you do not know in advance what you are looking for.
When you do know what you are looking for, log filtering lets you throttle logging to focus on what you want to read. You specify the criteria for a filtering policy, and apply the policy to a log publisher.
Log filtering policies use the following criteria:
-
Client IP address, bind DN, group membership
-
Operation type (abandon, add, bind, compare, connect, delete, disconnect, extended operation, modify, rename, search, and unbind)
-
Minimum entry size
-
Port number
-
Protocol used
-
Response time, queuing time, and processing time
-
Result codes (only log error results, for example)
-
Search response criteria (number of entries returned, unindexed search, and others)
-
Target DN
-
TLS handshakes
-
User DN and group membership
A log publisher’s filtering policy determines whether to include or exclude log messages that match the criteria.
Refer to the examples in Filter out administrative messages and Audit configuration changes.
Log HTTP access to files
JSON format
When you install DS using procedures from Installation,
the default JSON-based HTTP access log file is logs/http-access.audit.json
.
The name of the access log publisher in the configuration is Json File-Based HTTP Access Logger
.
The sample DS Docker image logs to standard output instead of files.
This makes it easy to read log messages with the docker logs
command,
and is a pattern you should follow when creating your own DS Docker images.
The name of the LDAP access log publisher configuration in the sample image is Console HTTP Access Logger
:
-
Decide whether to trust transaction IDs sent by client applications, used to correlate requests as they traverse multiple servers.
Client applications using the common audit event framework send transaction IDs with their requests. The transaction IDs correlate audit events, tracing the request through multiple applications.
Transaction IDs are sent over LDAP using an internal DS request control. They are sent over HTTP in an HTTP header.
By default, DS servers do not trust transaction IDs sent with client application requests.
When a server trusts transaction IDs from client application requests, outgoing requests reuse the incoming ID. For each outgoing request in the transaction, the request’s transaction ID has the form
original-transaction-id/sequence-number
, where sequence-number reflects the position of the request in the series of requests for this transaction. For example, if the original-transaction-id isabc123
, the first outgoing request has the transaction IDabc123/0
, the secondabc123/1
, the thirdabc123/2
, and so on. This lets you distinguish specific requests within a transaction when correlating audit events from multiple services.To trust transactions, set the advanced global server property,
trust-transaction-ids:true
:$ dsconfig \ set-global-configuration-prop \ --advanced \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --set trust-transaction-ids:true \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Edit the default HTTP access log publisher as necessary.
The following example enables the default log publisher for DS installed locally, not in a Docker image:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Json File-Based HTTP Access Logger" \ --set enabled:true \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
CSV format
A CSV handler sends messages to a comma-separated variable (CSV) file.
The interface stability of this feature is Deprecated. The CSV handler does not sanitize messages when writing to CSV log files. Do not open CSV logs in spreadsheets and other applications that treat data as code. |
The default CSV HTTP access log file is logs/http-access.csv
:
-
Decide whether to trust transaction IDs sent by client applications, used to correlate requests as they traverse multiple servers.
Client applications using the common audit event framework send transaction IDs with their requests. The transaction IDs correlate audit events, tracing the request through multiple applications.
Transaction IDs are sent over LDAP using an internal DS request control. They are sent over HTTP in an HTTP header.
By default, DS servers do not trust transaction IDs sent with client application requests.
When a server trusts transaction IDs from client application requests, outgoing requests reuse the incoming ID. For each outgoing request in the transaction, the request’s transaction ID has the form
original-transaction-id/sequence-number
, where sequence-number reflects the position of the request in the series of requests for this transaction. For example, if the original-transaction-id isabc123
, the first outgoing request has the transaction IDabc123/0
, the secondabc123/1
, the thirdabc123/2
, and so on. This lets you distinguish specific requests within a transaction when correlating audit events from multiple services.To trust transactions, set the advanced global server property,
trust-transaction-ids:true
:$ dsconfig \ set-global-configuration-prop \ --advanced \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --set trust-transaction-ids:true \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Create an enabled CSV file HTTP access logger with optional rotation and retention policies:
$ dsconfig \ create-log-publisher \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Common Audit Csv File HTTP Access Logger" \ --type csv-file-http-access \ --set enabled:true \ --set "rotation-policy:24 Hours Time Limit Rotation Policy" \ --set "rotation-policy:Size Limit Rotation Policy" \ --set "retention-policy:File Count Retention Policy" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
For tamper-evident logs, follow these steps.
Tamper-evident logging relies on digital signatures and regularly flushing messages to the log system. In high-volume directory deployments with heavy access patterns, signing log messages has a severe negative impact on server performance, reducing throughput by orders of magnitude.
Be certain to test the performance impact with realistic access patterns for your deployment before enabling the feature in production.
-
Prepare a keystore.
For details, refer to Make tampering evident.
-
Enable the tamper-evident capability:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Common Audit Csv File HTTP Access Logger" \ --set tamper-evident:true \ --set key-store-file:config/audit-keystore \ --set key-store-pin:"&{audit.keystore.pin}" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
In this example,
AUDIT_KEYSTORE_PIN
is an environment variable containing the keystore PIN.
-
Standard HTTP format
For HTTP requests, you can configure an access logger that uses the
Extended Log File Format, a W3C working draft.
The default log file is logs/http-access
:
-
Enable the standard format HTTP access logger:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "File-Based HTTP Access Logger" \ --set enabled:true \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
The following example shows an excerpt of an HTTP access log with space reformatted:
- <client-ip> bjensen <datestamp> GET /users/bjensen HTTP/1.1 200 <user-agent> 3 40 - <client-ip> bjensen <datestamp> GET /users/scarter HTTP/1.1 200 <user-agent> 4 9 - <client-ip> - <datestamp> GET /users/missing HTTP/1.1 401 <user-agent> 5 0 - <client-ip> kvaughan <datestamp> POST /users HTTP/1.1 200 <user-agent> 6 120
Missing values are replaced with
-
. Tabs separate the fields, and if a field contains a tab character, then the field is surrounded with double quotes. DS software repeats double quotes in the field to escape them.Configure the
log-format
property to set the fields. The default fields are shown here in the order they occur in the log file:Field Description cs-host
Client hostname.
c-ip
Client IP address.
cs-username
Username used to authenticate.
x-datetime
Completion timestamp for the HTTP request.
Configure with the
log-record-time-format
property.cs-method
HTTP method requested by the client.
cs-uri
URI requested by the client.
cs-uri-stem
URL-encoded path requested by the client.
cs-uri-query
URL-encoded query parameter string requested by the client.
cs-version
HTTP version requested by the client.
sc-status
HTTP status code for the operation.
cs(User-Agent)
User-Agent identifier.
x-connection-id
Connection ID used for DS internal operations.
When using this field to match HTTP requests with internal operations in the LDAP access log, set the access log advanced property,
suppress-internal-operations:false
. By default, internal operations do not appear in the LDAP access log.x-etime
Execution time in milliseconds needed by DS to service the HTTP request.
x-transaction-id
The common audit event framework transaction ID for the request.
This defaults to
0
, unless you configure the server to trust transaction IDs.The following additional fields are supported:
Field Description c-port
Client port number.
s-computername
Server name writing the access log.
s-ip
Server IP address.
s-port
Server port number.
Log LDAP access to files
JSON format
When you install DS using procedures from Installation,
the primary JSON-based LDAP access log file is logs/ldap-access.audit.json
.
The name of the access log publisher in the configuration is Json File-Based Access Logger
.
The sample DS Docker image logs to standard output instead of files.
This makes it easy to read log messages with the docker logs
command,
and is a pattern you should follow when creating your own DS Docker images.
The name of the LDAP access log publisher configuration in the sample image is Console LDAP Access Logger
.
Primary access logs include messages for each LDAP operation. They can grow quickly, but are particularly useful for analyzing overall client behavior:
-
Decide whether to trust transaction IDs sent by client applications, used to correlate requests as they traverse multiple servers.
Client applications using the common audit event framework send transaction IDs with their requests. The transaction IDs correlate audit events, tracing the request through multiple applications.
Transaction IDs are sent over LDAP using an internal DS request control. They are sent over HTTP in an HTTP header.
By default, DS servers do not trust transaction IDs sent with client application requests.
When a server trusts transaction IDs from client application requests, outgoing requests reuse the incoming ID. For each outgoing request in the transaction, the request’s transaction ID has the form
original-transaction-id/sequence-number
, where sequence-number reflects the position of the request in the series of requests for this transaction. For example, if the original-transaction-id isabc123
, the first outgoing request has the transaction IDabc123/0
, the secondabc123/1
, the thirdabc123/2
, and so on. This lets you distinguish specific requests within a transaction when correlating audit events from multiple services.To trust transactions, set the advanced global server property,
trust-transaction-ids:true
:$ dsconfig \ set-global-configuration-prop \ --advanced \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --set trust-transaction-ids:true \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Edit the default access log publisher as necessary.
The following example applies the default settings for DS installed locally, not in a Docker image:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Json File-Based Access Logger" \ --set enabled:true \ --add "rotation-policy:24 Hours Time Limit Rotation Policy" \ --add "rotation-policy:Size Limit Rotation Policy" \ --set "retention-policy:File Count Retention Policy" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
Filtered JSON format
DS servers write messages to a filtered access log file, logs/filtered-ldap-access.audit.json
.
This log grows more slowly than the primary access log. It includes only messages about the following:
-
Administrative requests related to backing up and restoring data, scheduling tasks, and reading and writing configuration settings
-
Authentication failures
-
Requests from client applications that are misbehaving
-
Requests that take longer than one second for the server to process
-
Search requests that return more than 1000 entries
-
Unindexed searches
Follow these steps to change the configuration:
-
Edit the filtered access log publisher as necessary.
The following example updates the configuration to hide controls in log records:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Filtered Json File-Based Access Logger" \ --set log-controls:false \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Edit the filtering criteria as necessary.
The following commands list the relevant default filtering criteria settings for the filtered access log:
$ dsconfig \ get-access-log-filtering-criteria-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Filtered Json File-Based Access Logger" \ --criteria-name "Administrative Requests" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt log-record-type : add, bind, compare, delete, extended, : modify, rename, search request-target-dn-equal-to : "**,cn=config", "**,cn=tasks", : cn=config, cn=tasks $ dsconfig \ get-access-log-filtering-criteria-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Filtered Json File-Based Access Logger" \ --criteria-name "Auth Failures" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt log-record-type : add, bind, compare, delete, extended, : modify, rename, search response-result-code-equal-to : 7, 8, 13, 48, 49, 50, 123 $ dsconfig \ get-access-log-filtering-criteria-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Filtered Json File-Based Access Logger" \ --criteria-name "Long Requests" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt log-record-type : add, bind, compare, delete, extended, : modify, rename, search response-etime-greater-than : 1000 $ dsconfig \ get-access-log-filtering-criteria-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Filtered Json File-Based Access Logger" \ --criteria-name "Misbehaving Clients" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt log-record-type : add, bind, compare, delete, extended, : modify, rename, search response-result-code-equal-to : 1, 2, 17, 18, 19, 21, 34, 60, 61, 64, : 65, 66, 67, 69 $ dsconfig \ get-access-log-filtering-criteria-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Filtered Json File-Based Access Logger" \ --criteria-name "Searches Returning 1000+ Entries" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt log-record-type : search search-response-nentries-greater-than : 1000 $ dsconfig \ get-access-log-filtering-criteria-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Filtered Json File-Based Access Logger" \ --criteria-name "Unindexed Searches" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt log-record-type : search search-response-is-indexed : false
For details about the LDAP result codes listed in the criteria, refer to LDAP result codes.
For details about how filtering works, refer to Access log filtering.
Log modifications
You can configure a DS log publisher for JSON-based LDAP access logs to record the attributes targeted by modification requests.
The following example enables the default Json File-Based Access Logger
to log modifications in its log file,
logs/ldap-access.audit.json
:
$ dsconfig \
set-log-publisher-prop \
--publisher-name "Json File-Based Access Logger" \
--set log-modified-attribute-values:true \
--hostname localhost \
--port 4444 \
--bindDN uid=admin \
--bindPassword password \
--usePkcs12TrustStore /path/to/opendj/config/keystore \
--trustStorePassword:file /path/to/opendj/config/keystore.pin \
--no-prompt
The example uses the default settings for the related advanced properties:
-
exclude-values-of-attributes
includesauthPassword
anduserPassword
to avoid logging hashed passwords. -
include-values-of-attributes
isn’t set.
When a client application requests a modification,
DS includes the modifications in the audit event message request
object.
The following example shows an extract of the audit event message
for a request changing Babs’s description
to New description
:
{
"request": {
"protocol": "LDAPS",
"operation": "MODIFY",
"dn": "uid=bjensen,ou=people,dc=example,dc=com",
"modifications": [{
"modification": "replace",
"attribute": "description",
"values": ["New description"]
}]
}
}
CSV format
A CSV handler sends messages to a comma-separated variable (CSV) file.
The interface stability of this feature is Deprecated. The CSV handler does not sanitize messages when writing to CSV log files. Do not open CSV logs in spreadsheets and other applications that treat data as code. |
The default CSV LDAP access log file is logs/ldap-access.csv
:
-
Decide whether to trust transaction IDs sent by client applications, used to correlate requests as they traverse multiple servers.
Client applications using the common audit event framework send transaction IDs with their requests. The transaction IDs correlate audit events, tracing the request through multiple applications.
Transaction IDs are sent over LDAP using an internal DS request control. They are sent over HTTP in an HTTP header.
By default, DS servers do not trust transaction IDs sent with client application requests.
When a server trusts transaction IDs from client application requests, outgoing requests reuse the incoming ID. For each outgoing request in the transaction, the request’s transaction ID has the form
original-transaction-id/sequence-number
, where sequence-number reflects the position of the request in the series of requests for this transaction. For example, if the original-transaction-id isabc123
, the first outgoing request has the transaction IDabc123/0
, the secondabc123/1
, the thirdabc123/2
, and so on. This lets you distinguish specific requests within a transaction when correlating audit events from multiple services.To trust transactions, set the advanced global server property,
trust-transaction-ids:true
:$ dsconfig \ set-global-configuration-prop \ --advanced \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --set trust-transaction-ids:true \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Create an enabled CSV file access logger with optional rotation and retention policies:
$ dsconfig \ create-log-publisher \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Common Audit Csv File Access Logger" \ --type csv-file-access \ --set enabled:true \ --set "rotation-policy:24 Hours Time Limit Rotation Policy" \ --set "rotation-policy:Size Limit Rotation Policy" \ --set "retention-policy:File Count Retention Policy" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
For tamper-evident logs, follow these steps.
Tamper-evident logging relies on digital signatures and regularly flushing messages to the log system. In high-volume directory deployments with heavy access patterns, signing log messages has a severe negative impact on server performance, reducing throughput by orders of magnitude.
Be certain to test the performance impact with realistic access patterns for your deployment before enabling the feature in production.
-
Prepare a keystore.
For details, refer to Make tampering evident.
-
Enable the tamper-evident capability:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Common Audit Csv File Access Logger" \ --set tamper-evident:true \ --set key-store-file:config/audit-keystore \ --set key-store-pin:"&{audit.keystore.pin}" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
In this example,
AUDIT_KEYSTORE_PIN
is an environment variable containing the PIN.
-
Backwards-compatible format
The interface stability of this feature is Deprecated. |
This access log format was the default for older DS servers.
Use this log format if you already have software configured to consume that format.
The default log file is logs/access
:
-
Enable the LDAP access logger:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "File-Based Access Logger" \ --set enabled:true \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
By default, this access log contains a message for each request, and a message for each response. It also includes messages for connection and disconnection.
Write messages only on responses by setting the
log-format:combined
property. The setting is useful when filtering messages based on response criteria. It causes the server to log one message per operation, rather than one for each request and response.
Log to a service
The interface stability of this feature is Deprecated. |
The Common Audit framework supports logging access events to an external service:
JDBC
A JDBC handler sends messages to an appropriately configured relational database table.
Before you enable the JDBC handler, create the necessary schema and tables in the target database. Refer to the following example files:
-
opendj/config/audit-handlers/mysql_tables-example.sql
-
opendj/config/audit-handlers/oracle_tables-example.sql
-
opendj/config/audit-handlers/postgres_tables-example.sql
The JDBC handler depends on the JDBC driver for the database,
and on HirakiCP.
Copy the JDBC driver .jar file for your database, the HirakiCP .jar file for your Java version,
and any other dependent libraries required to the opendj/extlib/
directory.
To enable the JDBC handler, refer to Configure a custom access log. The JSON configuration file for the JDBC handler has the following format:
{
"class": "org.forgerock.audit.handlers.jdbc.JdbcAuditEventHandler",
"config": {
"name": string, // Handler name, such as "jdbc".
"topics": array, // LDAP: "ldap-access"; HTTP: "http-access".
"databaseType": string, // Supported by default: "h2", "mysql",
// "oracle", "postgres".
"enabled": boolean, // Is the handler enabled?
"buffering": { // (Optional) Default: write each message separately,
// no buffering.
"enabled": boolean, // Buffer messages to be sent? Default: false.
"writeInterval": duration, // Duration; must be > 0 if buffering is enabled.
"autoFlush": boolean, // Flush messages automatically? Default: true.
"maxBatchedEvents": number, // Maximum messages in prepared statement. Default: 100.
"maxSize": number, // Maximum number of buffered messages. Default: 5000.
"writerThreads": number // Threads to write buffered messages: Default: 1.
},
"connectionPool": {
"dataSourceClassName": string, // Either set this to the class name of the data source...
"jdbcUrl": string, // ...or set this to the JDBC URL to
// connect to the database.
"username": string, // Username to connect to the database.
"password": string, // Password to connect to the database.
"autoCommit": boolean, // (Optional) Commit transactions automatically?
// Default: true.
"connectionTimeout": number, // (Optional) Milliseconds to wait before timing out.
// Default: 30,000.
"idleTimeout": number, // (Optional) Milliseconds to wait before timing out.
// Default: 600,000.
"maxLifetime": number, // (Optional) Milliseconds thread remains in pool.
// Default: 1,800,000.
"minIdle": number, // (Optional) Minimum connections in pool.
// Default: 10.
"maxPoolSize": number, // (Optional) Maximum number of connections in pool.
// Default: 10.
"poolName": string, // (Optional) Name of connection pool.
// Default: audit.
"driverClassName": string // (Optional) Class name of database driver.
// Default: null.
},
"tableMappings": [ // Correspondence of message fields to database columns.
{
"event": string, // LDAP: "ldap-access"; HTTP: "http-access".
"table": string, // LDAP: "ldapaccess"; HTTP: "httpaccess".
"fieldToColumn": { // Map of field names to database column names.
"event-field": "database-column" // Event-field takes JSON pointer.
}
}
]
}
}
For a sample configuration, refer to opendj/config/audit-handlers/jdbc-config.json-example
.
The writeInterval
takes a duration, which is a lapse of time expressed in English,
such as 23 hours 59 minutes and 59 seconds
. Durations are not case sensitive.
Negative durations are not supported. Durations use these units:
-
indefinite
,infinity
,undefined
,unlimited
: unlimited duration -
zero
,disabled
: zero-length duration -
days
,day
,d
: days -
hours
,hour
,h
: hours -
minutes
,minute
,min
,m
: minutes -
seconds
,second
,sec
,s
: seconds -
milliseconds
,millisecond
,millisec
,millis
,milli
,ms
: milliseconds -
microseconds
,microsecond
,microsec
,micros
,micro
,us
: microseconds -
nanoseconds
,nanosecond
,nanosec
,nanos
,nano
,ns
: nanoseconds
JMS
A JMS handler is a JMS producer that publishes messages to an appropriately configured Java Message Service.
To enable the JMS handler, refer to Configure a custom access log. The JSON configuration file for the JMS handler has the following format:
{
"class": "org.forgerock.audit.handlers.jms.JmsAuditEventHandler",
"config": {
"name": string, // Handler name, such as "jms".
"enabled": boolean, // Is the handler enabled?
"topics": array, // LDAP: "ldap-access"; HTTP: "http-access".
"deliveryMode": string, // One of "NON_PERSISTENT", "PERSISTENT".
"sessionMode": string, // One of "AUTO", "CLIENT", "DUPS_OK".
"batch": { // (Optional) Default: Use default settings.
"capacity": number, // Maximum capacity of publishing queue. Default: 1.
"maxBatchedEvents": number, // Maximum events to deliver in single publishing call.
// Default: 1.
"writeInterval": string // Interval between transmissions to JMS.
// Default: "10 millis".
},
"jndi": { // (Optional) Default: Use default settings.
"connectionFactoryName": string, // JNDI name for JMS connection factory.
// Default: "ConnectionFactory".
"topicName": string // (Optional) Match the value in the context.
// Default: "audit".
"contextProperties": { // JNDI InitialContext properties.
// These depend on the JNDI provider. Refer to the provider documentation for details.
}
}
}
}
For a sample configuration, refer to opendj/config/audit-handlers/jms-config.json-example
.
Syslog
A Syslog handler sends messages to the Linux system log as governed by RFC 5424, The Syslog Protocol.
The implementation currently only supports writing access messages, not error messages. As a result, this feature is of limited use in most deployments. |
To enable a Syslog handler, refer to Configure a custom access log. The JSON configuration file for the Syslog handler has the following format:
{
"class": "org.forgerock.audit.handlers.syslog.SyslogAuditEventHandler",
"config": {
"name": string, // Handler name, such as "syslog".
"enabled": boolean, // Default: false.
"topics": array, // LDAP: "ldap-access"; HTTP: "http-access".
"protocol": string, // "TCP" or "UDP".
"host": string, // Syslog daemon host, such as localhost;
// must resolve to IP address.
"port": number, // Syslog daemon port number, such as 514; range: 0 to 65535.
"connectTimeout": number, // If using TCP, milliseconds to wait before timing out.
"facility": string, // Syslog facility to use for event messages.
"buffering": { // (Optional) Default: write each message separately, no buffering.
"enabled": boolean, // Buffer messages to be sent? Default: false.
"maxSize": number // Maximum number of buffered messages. Default: 5000.
}
}
}
For a sample configuration, refer to opendj/config/audit-handlers/syslog-config.json-example
.
For additional details, refer to Syslog facility values.
Value | Description |
---|---|
|
Kernel messages. |
|
User-level messages. |
|
Mail system. |
|
System daemons. |
|
Security/authorization messages. |
|
Messages generated internally by |
|
Line printer subsystem. |
|
Network news subsystem. |
|
UUCP subsystem. |
|
Clock daemon. |
|
Security/authorization messages. |
|
FTP daemon. |
|
NTP subsystem. |
|
Log audit. |
|
Log alert. |
|
Clock daemon. |
|
Local use 0. |
|
Local use 1. |
|
Local use 2. |
|
Local use 3. |
|
Local use 4. |
|
Local use 5. |
|
Local use 6. |
|
Local use 7. |
Manage logs
Configure a custom access log
This procedure applies only to Common Audit logs.
An access logger with a JSON configuration lets you use any Common Audit event handler, including customer handlers. The content of the configuration file depends on the audit event handler:
-
Decide whether to trust transaction IDs sent by client applications, used to correlate requests as they traverse multiple servers.
Client applications using the common audit event framework send transaction IDs with their requests. The transaction IDs correlate audit events, tracing the request through multiple applications.
Transaction IDs are sent over LDAP using an internal DS request control. They are sent over HTTP in an HTTP header.
By default, DS servers do not trust transaction IDs sent with client application requests.
When a server trusts transaction IDs from client application requests, outgoing requests reuse the incoming ID. For each outgoing request in the transaction, the request’s transaction ID has the form
original-transaction-id/sequence-number
, where sequence-number reflects the position of the request in the series of requests for this transaction. For example, if the original-transaction-id isabc123
, the first outgoing request has the transaction IDabc123/0
, the secondabc123/1
, the thirdabc123/2
, and so on. This lets you distinguish specific requests within a transaction when correlating audit events from multiple services.To trust transactions, set the advanced global server property,
trust-transaction-ids:true
:$ dsconfig \ set-global-configuration-prop \ --advanced \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --set trust-transaction-ids:true \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Create the external JSON configuration file for the handler.
Base your work on the appropriate template in the
config/audit-handlers
directory. -
If this is a custom access logger provided separately, copy the custom handler .jar file to
opendj/lib/extensions
. -
Create a log publisher configuration for the access log.
The
type
defines whether the log contains messages about LDAP or HTTP requests:-
For LDAP access logging, create an external access log publisher:
$ dsconfig \ create-log-publisher \ --publisher-name "Custom LDAP Access Logger" \ --type external-access \ --set enabled:true \ --set config-file:config/audit-handlers/handler-conf.json \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
For HTTP access logging, create an external HTTP access log publisher:
$ dsconfig \ create-log-publisher \ --publisher-name "Custom HTTP Access Logger" \ --type external-http-access \ --set enabled:true \ --set config-file:config/audit-handlers/handler-conf.json \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Log access to standard output
This procedure applies only to Common Audit file-based logs, and when you install DS using procedures from Installation.
The sample DS Docker image creates these console access loggers by default:
-
Console LDAP Access Logger
-
Console HTTP Access Logger
A JSON stdout handler sends messages to standard output.
Only use this logger when running the server with When running as a daemon without the As a result, using the JSON stdout handler when running the server
without the |
-
Enable the JSON stdout handler.
For details, refer to Configure a custom access log.
The JSON configuration file for the JSON stdout handler has the following format:
{ "class": "org.forgerock.audit.handlers.json.stdout.JsonStdoutAuditEventHandler", "config": { "enabled": boolean, // Is the handler enabled? "name": string, // Handler name, such as "json.stdout". "elasticsearchCompatible" : boolean, // If true, the message ID field is named _eventId. // (Default: _id) "topics": array, // LDAP: "ldap-access"; HTTP: "http-access". } }
For a sample configuration, refer to
opendj/config/audit-handlers/json-stdout-config.json-example
.
Log errors to standard output
A console-error
logger sends messages to standard output.
This procedure applies only when you install DS using procedures from Installation.
The sample DS Docker image creates a Console Error Logger
by default.
Only use this logger when running the server with When running as a daemon without the As a result, using the JSON stdout handler when running the server
without the |
-
Switch to a
console-error
logger while the server is offline:$ stop-ds $ dsconfig \ delete-log-publisher \ --publisher-name "File-Based Error Logger" \ --offline \ --configFile /path/to/opendj/config/config.ldif \ --no-prompt $ dsconfig \ create-log-publisher \ --type console-error \ --publisher-name "Console Error Logger" \ --set enabled:true \ --set default-severity:notice \ --set override-severity:SYNC=INFO \ --offline \ --configFile /path/to/opendj/config/config.ldif \ --no-prompt $ start-ds --noDetach
Log error messages as JSON
By default, error log messages start with a timestamp, followed by space-separated field=value
pairs,
where the last msg
field contains free-form text.
The format is human-readable, but can be less convenient to parse than standard JSON.
You can set the error log publisher property json-output:true
to cause the publisher to generate JSON messages:
-
Stop DS.
-
Move existing, free-form text error log files.
-
Change to JSON output.
The following command changes the default error log publisher configuration while DS is stopped:
$ dsconfig \ set-log-publisher-prop \ --publisher-name "File-Based Error Logger" \ --set json-output:true \ --offline \ --configFile /path/to/opendj/config/config.ldif \ --no-prompt
-
Start DS.
Rotate and retain logs
Each file-based log has a rotation policy, and a retention policy.
The rotation policy specifies when to rotate a log file based on a time, log file age, or log file size. Rotated logs have a rotation timestamp appended to their name.
The retention policy specifies whether to retain logs based on the number of logs, their size, or how much free space should be left on the disk.
-
List log rotation policies:
$ dsconfig \ list-log-rotation-policies \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt Log Rotation Policy : Type : file-size-limit : rotation-interval : time-of-day ------------------------------------:------------:-----------------:-------------------:------------ 24 Hours Time Limit Rotation Policy : time-limit : - : 1 d : - 7 Days Time Limit Rotation Policy : time-limit : - : 1 w : - Fixed Time Rotation Policy : fixed-time : - : - : 2359 Size Limit Rotation Policy : size-limit : 100 mb : - : -
-
List log retention policies:
$ dsconfig \ list-log-retention-policies \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt Log Retention Policy : Type : disk-space-used : free-disk-space : number-of-files ---------------------------------:-----------------:-----------------:-----------------:---------------- File Count Retention Policy : file-count : - : - : 10 Free Disk Space Retention Policy : free-disk-space : - : 500 mb : - Size Limit Retention Policy : size-limit : 500 mb : - : -
-
View the policies that apply to a given log with the
dsconfig get-log-publisher-prop
command.The following example shows that the server keeps 10 access log files, rotating either each day or when the log size reaches 100 MB:
$ dsconfig \ get-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Json File-Based Access Logger" \ --property retention-policy \ --property rotation-policy \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt Property : Value(s) -----------------:------------------------------------------------------------- retention-policy : File Count Retention Policy rotation-policy : 24 Hours Time Limit Rotation Policy, Size Limit Rotation : Policy
-
Use the
dsconfig
command to create, update, delete, and assign log rotation and retention policies. Set the policy that applies to a logger with thedsconfig set-log-publisher-prop
command.
When using access logs based on the common audit event framework, you can only configure one of each type of retention or rotation policy. This means you can configure only one file count, free disk space, and size limit log retention policy. You can configure only one fixed time, size limit, and time limit log rotation policy. |
Enable an audit log
-
Enable a file-based audit logger:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "File-Based Audit Logger" \ --set enabled:true \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Wait for, or make a change to directory data.
The following example changes a description:
$ ldapmodify \ --hostname localhost \ --port 1636 \ --useSsl \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --bindDN "uid=bjensen,ou=People,dc=example,dc=com" \ --bindPassword hifalutin << EOF dn: uid=bjensen,ou=People,dc=example,dc=com changetype: modify replace: description description: New description EOF
The audit log records the changes as shown in the following excerpt:
# <datestamp>; conn=<number>; op=<number> dn: cn=File-Based Audit Logger,cn=Loggers,cn=config changetype: modify replace: ds-cfg-enabled ds-cfg-enabled: true - # <datestamp>; conn=<number>; op=<number> dn: uid=bjensen,ou=people,dc=example,dc=com changetype: modify add: description description: New description -
Audit logs record changes in LDIF format. This means that when an LDAP entry is deleted, the audit log records only its DN.
Filter out administrative messages
A common development troubleshooting technique consists of sending client requests while tailing the access log:
$ tail -f /path/to/opendj/logs/ldap-access.audit.json
When the dsconfig
command accesses the configuration, the access log records this.
Such messages can prevent you from noticing the messages of interest from client applications.
You can filter access log messages for administrative connections to the administration port:
-
Configure access log filtering criteria:
$ dsconfig \ create-access-log-filtering-criteria \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Json File-Based Access Logger" \ --criteria-name "Exclude LDAPS on 4444" \ --type generic \ --set connection-port-equal-to:4444 \ --set connection-protocol-equal-to:ldaps \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Activate filtering to exclude administrative messages:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Json File-Based Access Logger" \ --set filtering-policy:exclusive \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
The publisher filters messages about administrative requests to the administration port.
Audit configuration changes
This example demonstrates how to set up an audit log file to track changes to the server configuration.
Audit log change records have timestamped comments with connection and operation IDs. You can use these to correlate the changes with messages in access logs:
-
Create an audit log publisher:
$ dsconfig \ create-log-publisher \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "File-Based Server Configuration Audit Log" \ --type file-based-audit \ --set enabled:true \ --set filtering-policy:inclusive \ --set log-file:logs/config-audit \ --set rotation-policy:"24 Hours Time Limit Rotation Policy" \ --set rotation-policy:"Size Limit Rotation Policy" \ --set retention-policy:"File Count Retention Policy" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Create log filtering criteria for the logger that matches operations targeting
cn=config
:$ dsconfig \ create-access-log-filtering-criteria \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "File-Based Server Configuration Audit Log" \ --criteria-name "Record changes to cn=config" \ --set request-target-dn-equal-to:"**,cn=config" \ --set request-target-dn-equal-to:"cn=config" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
The server now writes to the audit log file,
/path/to/opendj/logs/config-audit
, whenever an administrator changes the server configuration. The following example output shows the resulting LDIF that defines the log filtering criteria:# <datestamp>; conn=<id>; op=<id> dn: cn=Record changes to cn=config,cn=Filtering Criteria,cn=File-Based Server Configuration Audit Log,cn=Loggers,cn=config changetype: add objectClass: top objectClass: ds-cfg-access-log-filtering-criteria cn: Record changes to cn=config ds-cfg-request-target-dn-equal-to: **,cn=config ds-cfg-request-target-dn-equal-to: cn=config createTimestamp: <timestamp> creatorsName: editable:dsAdminDN["uid=admin"] entryUUID: <uuid>
Allow log message fields
-
When an object is passed in a Common Audit event, it might contain information that should not be logged. By default, the Common Audit implementation uses a whitelist to specify which fields of the event appear:
-
For Common Audit HTTP access log publishers, edit the
log-field-whitelist
property.The following fields appear by default, with each field listed by its JSON path. You cannot change the default whitelist.
If a whitelisted field contains an object, then listing the field means the whole object is whitelisted:
-
/_id
-
/timestamp
-
/eventName
-
/transactionId
-
/trackingIds
-
/userId
-
/client
-
/server
-
/http/request/secure
-
/http/request/method
-
/http/request/path
-
/http/request/headers/accept
-
/http/request/headers/accept-api-version
-
/http/request/headers/content-type
-
/http/request/headers/host
-
/http/request/headers/user-agent
-
/http/request/headers/x-forwarded-for
-
/http/request/headers/x-forwarded-host
-
/http/request/headers/x-forwarded-port
-
/http/request/headers/x-forwarded-proto
-
/http/request/headers/x-original-uri
-
/http/request/headers/x-real-ip
-
/http/request/headers/x-request-id
-
/http/request/headers/x-requested-with
-
/http/request/headers/x-scheme
-
/request
-
/response
-
For CSV logs, the values map to the column headers. The terms are separated by dots (
.
) rather than by slashes (/
).-
LDAP access loggers do not support whitelisting.
By default, all fields are whitelisted.
-
Deny log message fields
When an object is passed in a Common Audit event, it might contain information that should not be logged. Loggers allow all fields that are safe to log by default. The whitelist is processed before the blacklist, so blacklist settings overwrite the whitelist defaults:
-
Blacklist individual fields in common audit access logs to prevent the fields from appearing in messages.
The following example prevents all request headers from appearing in JSON HTTP access logs:
$ dsconfig \ set-log-publisher-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --publisher-name "Json File-Based HTTP Access Logger" \ --set log-field-blacklist:/http/response/headers \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
The blacklist values are JSON paths to the fields in log messages.
For CSV logs, the blacklist values map to the column headers. The terms are separated by dots (
.
) rather than by slashes (/
).
Make tampering evident
This procedure applies only to Common Audit-based logs.
Tamper-evident logging depends on a public key/private key pair and a secret key. The Common Audit framework accesses the keys in a JCEKS-type keystore. Follow these steps to prepare the keystore:
-
Create a password for the keystore.
The examples below use an
AUDIT_KEYSTORE_PIN
environment variable that contains the password. -
Generate a key pair in the keystore.
The keystore holds a signing key with the alias
Signature
. Generate the key with theRSA
key algorithm, and theSHA256withRSA
signature algorithm.The following example uses the default file name:
$ keytool \ -genkeypair \ -keyalg RSA \ -sigalg SHA256withRSA \ -alias "Signature" \ -dname "CN=ds.example.com,O=Example Corp,C=FR" \ -keystore /path/to/opendj/config/audit-keystore \ -storetype JCEKS \ -storepass:env AUDIT_KEYSTORE_PIN \ -keypass:env AUDIT_KEYSTORE_PIN
You can configure the file name with the log publisher
key-store-file
property. -
Generate a secret key in the keystore.
The keystore holds a symmetric key with the alias
Password
. Generate the key with theHmacSHA256
key algorithm, and 256-bit key size.The following example uses the default file name:
$ keytool \ -genseckey \ -keyalg HmacSHA256 \ -keysize 256 \ -alias "Password" \ -keystore /path/to/opendj/config/audit-keystore \ -storetype JCEKS \ -storepass:env AUDIT_KEYSTORE_PIN \ -keypass:env AUDIT_KEYSTORE_PIN
You can configure the file name with the log publisher
key-store-file
property. -
Verify that the keystore contains signature and password keys:
$ keytool \ -list \ -keystore /path/to/opendj/config/audit-keystore \ -storetype JCEKS \ -storepass:env AUDIT_KEYSTORE_PIN password, <date>, SecretKeyEntry, signature, <date>, PrivateKeyEntry, Certificate fingerprint (SHA-256): <fingerprint>