Event Log Parameter Descriptions
The contents of the parameters highlighted in red may differ according to the event.
Type | Description | Example Parameters | Parameter Description |
---|---|---|---|
/aaa/freeradius/8021.x/config/get | Listing records in the Radius 802.1x Configuration event in the Administration/Radius 802.1x Config page | {} | No parameter |
/aapm/account/delete | Deleting AAPM account event in the AAPM Management page | {applicationIp=[0.0.0.0/0], sapmAccounts=[/Test group/test3], eventUsername=admin, sapmGroups=[/Test group], allowListingAccounts=false, dbId=7232127, isActiveUsageLimitation=false, isActiveTimeLimitation=false, pinPort=0, applicationName=aa} | applicationIp=Deleted App IP, sapmAccounts= The SAPM accounts connected to the deleted AAPM account, eventUsername= The username of the account which deleted the AAPM Account, sapmGroups= The SAPM groups connected to the deleted AAPM account, allowListingAccounts= The allowance status for listing the account , dbId=Deleted AAPM account's DB ID, isActiveUsageLimitation= The allowance status for activating the user limitation , isActiveTimeLimitation=The allowance status for activating the time limitation, pinPort= PIN port is the requester server port Kron PAM shares the PIN value with. With this PIN value the requester can get the secret if other requirements are satisfied. It is 0, if there is no pin , applicationName= Deleted AAPM account's name |
/aapm/account/save | Creating/Editing account event in the AAPM Management page | {applicationIp=[0.0.0.1/24, 10.0.8.1/24], sapmAccounts=[elifStaticUserCredential], eventUsername=admin, sapmGroups=[], allowListingAccounts=false, isActiveUsageLimitation=false, isActiveTimeLimitation=false, pinPort=0, applicationName=AAPMStaticUserCredential} | applicationIp= AAPM account IP address, sapmAccounts=SAPM accounts assigned to the AAPM account, eventUsername=Username of the account that created/edited the AAPM account, sapmGroups=SAPM groups assigned to the AAPM account, allowListingAccounts=false, isActiveUsageLimitation=Status(True/False) of active usage limitation, isActiveTimeLimitation=Status(True/False) of active time limitation, pinPort=value of Pin sending port, applicationName= AAPM account name |
/aapm/account/search | Searching AAPM account event in the AAPM Management page | {applicationIp=[], sapmAccounts=[], pinPort=0, sapmGroups=[], dbId=843015} | {applicationIp= application IP Address, sapmAccounts=SAPM accounts included in the AAPM account, pinPort= PIN port is the requester server port Kron PAM shares the PIN value with. With this PIN value the requester can get the secret, if other requirements are satisfied., sapmGroups=SAPM groups included in the AAPM account, dbId= AAPM account DB Id |
/aapm/config/save | Creating/Editing configuration event in the AAPM Management page | {name=test, description=asd, strategy=ORACLE_WEBLOGIC} | name= AAPM Configuration name, description= AAPM Configuration description, strategy= The strategy for the created AAPM configuration |
/aapm/config/search | Searching AAPM configuration event in the AAPM Management page | {} | No parameter |
/aapm/trigger/delete | Deleting AAPM trigger event in the AAPM Management page | {dbId=5968539, targetDeviceGroup=Windows, targetType=BULK, elementTypeId=windows, sapmUsername=irem.sapm2, config=com.kron.sc.aapm.api.pojo.AapmConfig@6502ecdb} | dbId=Deleted trigger's DB ID, targetDeviceGroup= Trigger's target device group, targetType= Trigger’s target type, elementTypeId= Selected device group’s Element type Id, sapmUsername= Trigger’s selected SAPM account, config= Trigger’s Selected AAPM configuration |
/aapm/trigger/save | Creating/Editing trigger event in the AAPM Management page | {targetDeviceGroup=testedted, sapmDeviceIp=10.20.42.56, targetType=BULK, elementTypeId=windows, sapmUsername=irem.sapm1, config=com.kron.sc.aapm.api.pojo.AapmConfig@7f8c94eb} | targetDeviceGroup= Saved trigger Target device group Name, sapmDeviceIp= The IP of the SAPM account chosen for trigger, targetType= Saved trigger target type, elementTypeId= Saved trigger element type id, sapmUsername= Selected SAPM account username for the saved trigger, config= Saved trigger selected AAPM configuration |
/aapm/trigger/search | Searching AAPM trigger event in the AAPM Management page | {} | No parameter |
/aapm/trigger-process/search | Searching APPM trigger process event in the AAPM Management page | {} | No parameter |
/addPermissionToAccount | Adding permission to account event via API | {sapmDbId=268567, newPermissions={9aeddee5-d9a2-4a0c-b476-cc58e8083a74=FULL_CONTROL}} | sapmDbId= DB ID of the SAPM account with the new permissions assigned, newPermission= given permissions to the SAPM accounts with the value {User Group ID=Permission Type} |
/addSapmAccount | Adding SAPM account event via API | {dbId=452373} | dbId= SAPM account db_id |
/addSapmGroup | Adding SAPM group event via API | {dbId=452064} | dbId= SAPM group dbid in the sapm_group table |
/command/save | Adding new command or Editing existing command event in the Privileged Task Manager/Command Template page | {name=Date, expression=date} | name = Created/Edited command name, expression = command |
/createSapmGroups | Creating SAPM groups event via API | {318198=Group A, 318200=Groupx} | {dbid=name} Created SAPM Groups are listed with the value SAPM Group DB ID= SAPM Group Name |
/deleteApprovalManagerFromSapmGroup | Deleting approval manager from SAPM group via API | {managerToDelete=24ad7d47-aa17-4cf9-89c2-0a07f55bc7f4, dbId=451986} | managerToDelete = Manager to be deleted |
/DeleteApprovedUserFromAccount | Deleting user from approved user list of SAPM Account event via API | {userName=os.expert1, dbId=452373} | userName= approved user username, dbId= SAPM account db_id |
/deletePermissionFromAccount | Deleting SAPM account's permissions event via API | {permissionsToDelete={9aeddee5-d9a2-4a0c-b476-cc58e8083a74=READ_ONLY}, sapmDbId=270640} | "sapmDbId": SAPM account DB ID, "permissionToDelete": Permission to be deleted with the values ("user group id" = "permission type") |
/deletePermissionFromGroup | Deleting SAPM group's permissions event via API | {"dbId"=85202, PermissionToDelete={9aeddee5-d9a2-4a0c-b476-cc58e8083a74=READ_ONLY},"applySub"="true"} | "dbId"= SAPM group DB ID, "permissionToDelete"=Permission to be deleted with the values ("user group id" = "permission type"), "applySub"= Given value of deletion process to apply the delete operation on the subgroups of the SAPM Group |
/deleteSapmAccount | Deleting SAPM account event via API | {"dbId"=10626} | "dbId"= deleted SAPM account DB ID |
/deleteSapmGroup | Deleting SAPM group event in via API | {dbId=51014} | dbId= Deleted SAPM account DB ID |
/device/deleted | Deleting device event in the Device Management page | {deviceName=10.20.42.19, managementIp=10.20.42.19} | deviceName= added device name (if nothing is entered it will be the same as managmentIp), managementIp= added device IP address |
/device/discovered | Creating/Editing device event in the Device Management page | {deviceName=10.20.42.63, managementIp=10.20.42.63} | deviceName= deleted device Name, managementIp = deleted device IP address |
/device/group/realm/search | Searching device group realm event in the Device Management page | {userGroups=[], deviceGroups=[LinuxDG]} | userGroups=User Group Names, deviceGroups= Device Group Names |
/device/group/show/secret | Showing device group secret event in the Device Management page | {propertyKey=globalPassword, deviceGroupName=rdp-40.64} | propertyKey= Device group property key name whose secret was shown, deviceGroupName= The name of the device group whose secret was shown |
/device/property/added | Adding device property event in the Device Management page | {propertyKey=remoteDesktop.server-layout, propertyValue=ru-ru, managementIp=10.20.40.64} | propertyKey= Added property key name, propertyValue= added property key value, managementIp= IP address of the device to which was added a property key |
/device/property/removed | Removing device property event in the Device Management page | {propertyKey=remoteDesktop.ignore-cert, managementIp=0.0.0.0} | propertyKey= removed property key name, managementIp=IP address of device whose property was removed |
/device/reDiscovered | Editing devices event in the Device Management page | {managementIp=10.20.42.55, deviceName=10.20.42.55, accessProtocol=RDP} | managementIp= rediscovered device IP address, deviceName = rediscovered device name, accessProtocol= rediscovered device access protocol type |
/deviceGroup/deleted | Deleting device group event in the Device Management page | {groupName=Linux} | groupName= deleted device group name |
/deviceGroup/saved | Creating/Editing device group event in the Device Management page | {groupName=ssh-42.63} | groupName= Created/Edited device group name |
/deviceGroupSubnet/deleted | Deleting subnet of device group event in the Device Management/Device Group page | {subnetCidr=12, deviceGroupName=Linux, subnetIP=10.20.42.56} | subnetCidr= deleted subnet CIDR value, deviceGroupName=Name of device group whose subnet is deleted, subnetIP= deleted subnet IP address |
/deviceGroupSubnet/saved | Adding/Editing device group subnet event in the Device Management/Device Group page | {subnetCidr=12, deviceGroupName=testedted, subnetIP=0.0.0.0} | subnetCidr= defined subnet CIDR value, deviceGroupName=Name of device group whose subnet is saved, subnetIP= saved subnet IP address |
/deviceRealm/deleted | Deleting device realm event in the Device Management page. | {realmName=test} | realmName= deleted device group realm name |
/deviceRealm/saved | Creating/Editing device realm event in the Device Management page. | {addedDeviceGroups=ssh-42.63,rdp-42.55, realmName=test-realm1, addedUserGroups=hw-experts,hw-managers,os-managers,os-experts} | addedDeviceGroups=Name of device groups that a realm is added to, realmName= new realm name, addedUserGroups=Name of user groups that a realm is added to |
/devices/elementType/delete | Deleting device element type event in the Device Management page | {elementTypeProperties=[], elementTypeid=test, elementTypeName=te} | elementTypeProperties=Element type properties of the deleted element type, elementTypeid= element type ID, elementTypeName= Element type name of deleted element type |
/devices/elementType/save | Creating/Editing device element type event in the Device Management page | {elementTypeProperties=[], elementTypeid=test, elementTypeName=te} | elementTypeProperties=Created/Edited element type properties, elementTypeid= Element type ID, elementTypeName=New element type name |
/devices/elementType/search | Searching device element type event in the Device Management page | {} | No parameter |
/editSapmAccount | Editing SAPM account event in the SAPM Management page | {dbId=452646} | dbId=Edited SAPM account DB ID |
/editSapmGroup | Editing SAPM group event in SAPM via API | {"dbId":85829, "parentSapmGroupId":85202, "name":"group-2"} | dbId=Edited SAPM group DB ID, parentSapmGroupId=Edited SAPM group's parent group, name= edited SAPM group name |
/getApprovalForAccount | Requesting approval for an SAPM account event via API | {dbId=268567} | dbId=DB ID of SAPM account the approval was requested for |
/GetApprovalForGroup | Requesting approval for an SAPM group event via API | {dbId=268244} | dbId=DB ID of SAPM group the approval was requested for |
/getApprovedUserListForAccount | Getting list of approved user list of an SAPM account event via API | {dbId=452373} | dbId= SAPM account DB ID |
/getApprovedUserListForGroup | Getting list of approved user list of an SAPM group event via API | {dbId=451986} | dbId= SAPM group DB ID |
/getApproverForSapmAccount(getApproversForSapmGroup) | Getting a list of approvers of an SAPM group event via API | {dbId=452373} | dbId= SAPM group DB ID |
/getApproverForSapmGroup | Getting a list of approvers of an SAPM account event via API | {dbId=630178} | dbId= SAPM account DB ID |
/getApproversForSapmAccount | Getting list of approvers of an SAPM account event via API | {dbId=452646} | dbId= SAPM account DB ID |
/getApproversForSapmGroup | Getting list of approvers of an SAPM group event via API | {"dbId": 85358} | dbId= SAPM group DB ID |
/getApproversForSapmGroupWithGroupName | Getting list of approvers of an SAPM group event via API | {dbId=630152} | dbId= SAPM group DB ID |
/getDeviceById | Getting the device information in detail by ID event via API | {1ec9187a-382a-4242-af59-38f5539ce1f6=10.20.42.63} | Device ID of the device whose device information is retrieved |
/getDeviceByName | Getting the device information in detail by name event via API | DEVICENAME | Device Name of the device whose device information is retrieved |
/getDeviceGroupByName | Getting the device group information in detail by name event via API | DEVICEGROUPNAME | Device Group Name of the device group whose information is retrieved |
/getDeviceGroupsOfSessionUser | Listing Device groups of logged on user via API | {dg.sc_proxy=Proxy, dff66252-b667-4722-88b3-fb10ec99bb62=rdp-41.55, e08181b0-26f6-499f-9e69-e61165f8cabf=Linux, 89d36c8a-fbcf-4688-8922-3ee3eca8752b=ssh-42.19} | Device Group ID=Device Group Name listed for the Session User |
/getDevicesOfDeviceGroupByDeviceGroupId | Getting the device information in a device group by device group ID event via API | DEVICEGROUPID | Device group DB ID |
/getElementTypes | Getting all element types event via API | {checkpoint=CheckPoint, huawei_sgsn=Huawei SGSN, aruba_wireless=Aruba Wireless, opensuse=openSUSE, Fortinet_Ogd=FORTINET OGD, a10_nat=A10 NAT, arbor_ddos=Arbor DDOS, huawei_nat=Huawei NAT, juniper_nsm_firewall=Juniper NSM Firewall, tic=TIC Aplenes, juniper_ssg_firewall=Juniper SSG Firewall, ericsson_HSS=Ericsson HSS, sc_proxy=SC PROXY, aws_aurora_mysql=AWS Aurora MySQL, ericsson_nat=Ericcson NAT, acme=ACME, nokia_wdm_pss32=Nokia WDM PSS32, a10_lb=A10 LB, aws_aurora_postgresql=AWS Aurora PostgreSQL, mysql=MySQL, arbor_pravail=Arbor PRAVAIL, huawei_olt=Huawei OLT, juniper_sa4_firewall=Juniper SA4 Firewall, huawei_vrp=Huawei NE40e-X8 VRP, citrix_load_balancer=Citrix Load Balancer, palo_alto=Palo Alto, ubuntu=Ubuntu, juniper_isg_firewall=Juniper ISG Firewall, oracledb=Oracle DB, cisco_nexus=Cisco Nexus Switch, ericsson_ccn=Ericcson CCN, suse_enterprise=SUSE Linux Enterprise, fortigate_firewall=Fortigate Firewall, juniper=Juniper Router, redhat=Red Hat, ericsson_mtas=Ericsson MTAS, alcatel_nms=Alcatel-Lucent NMS, cisco_ios=Cisco IOS Router, checkpoint_firewall=Checkpoint Firewall, genband=GENBAND, cassandra=Cassandra, f5_load_balancer=F5 Load Balancer, ibm_ips=IBM IPS, sandvine_pts=SANDVINE PTS, alcatel_switch=Alcatel-Lucent Switch, huawei_dslam=Huawei DSLAM, centos=CentOS, hive=Hive, juniper_srx_firewall=Juniper SRX Firewall, ericsson_sbg=Ericsson SBG, sap_hana=SAP HANA, enterasys=Enterasys, cisco_wireless=Cisco Wireless, sap_sybase=SAP Sybase, alcatel_router=Alcatel-Lucent Router, sandvine_sde=SANDVINE SDE, vmware_esxi=VMWare ESXi, postgresql=PostgreSQL, cisco_router_3600=Cisco 3600 Series Router, fortinet_fortigate=Fortinet FortiGate, couchbase=Couchbase, ericsson_sgsn=Ericcson SGSN, linux=Linux Server, mcafee_ips=MCAFEE IPS, cisco_ios_switch=Cisco IOS Switch, solaris=Solaris, mssql=MsSQL, rapid7_firewall=Rapid7 Firewall, cisco_ios_xe=Cisco IOS-XE Router, bluecat_dns=Bluecat DNS, teradata=Teradata, ericsson_ims=Ericcson Dicos IMS, windows=Windows, juniper_switch=Juniper Switch, huawei_switch=Huawei Switch, f5_big_ip=F5 Big IP, cisco_ios_xr=Cisco IOS-XR Router, ericsson_cscf=Ericsson CSCF, db2=Db2, fedora=Fedora, hp_switch=HP Switch, redback=Redback Router, huawei_router=Huawei Router, sandvine_spb=SANDVINE SPB, huawei_nms=Huawei NMS} | Listed all element types with the values element_type_id=element_type_name |
/getRemindBeforeValues | Setting reminder for SAPM password reservation event in the SAPM Manager page | {RemindBeforeValues={15=15 Minutes}} | RemindBeforeValues= reminder value (for example, it reminds the user he/she will get the password in 15 minutes.) |
/getSapmGroupWithPermission | Getting permission for SAPM group event via API | {dbId=451986} | dbId= SAPM group DB ID |
/getUserById | Getting users credentials by ID event via API | {userName=admin, userId=25e53f47-ce66-4df2-9abc-6961dc668264} | userName= searched user username, userId= searched user ID |
/group/delete | Deleting user group event in the User Management/User Accounts page | {userGroupName=tested} | userGroupName= Deleted user group's name |
/group/save | Creating/Editing User group event in the User Management/User Accounts page | {newAddedManagers=[os.expert1], addedUsers=[os.expert1], userGroupName=os-experts, removedManagers=[testuser]} | newAddedManagers= New managers of the user group, addedUsers=Added users to the user group, userGroupName= Created/Edited user group name, removedManagers= Removed Managers of the user group |
/group/search | Searching group event in the User Management/User Accounts/User Group Definition page | {adminGroup=false, usersStr=, autonomousGroup=false, allowConsoleAccess=false, approvalRequiredForConnection=false, allowDirectAccess=false, keepDeviceRealms=true, users=[], managers=[], recordLimit=1001} | adminGroup=Admin group selectance status, usersStr=has default value as null, autonomousGroup= Autonomous group selectance status, allowConsoleAccess=allowance status of the console access, approvalRequiredForConnection=Approval requirements for connection status, allowDirectAccess= direct access allowance status, keepDeviceRealms=Keeping device realms status (has default value as true), users=Users of the user group to be searched, managers= Managers of the user group to be searched, recordLimit=Search limitation to be listed (has default value) |
/integration/ldap/adUserNotDeleted | Preventing deletion of an LDAP user, if the user is in a local User group | {userName=testuser, existingGroups=[TestUserGr]} | Username=username of the user that is prevented from being deleted, exsistingGroups=Local user group name, including the user that is prevented from being deleted |
/isApprovalRequired | After assigning manager SAPM group/account approval is required event in the SAPM Management page | {dbId=452373} | dbId= DB ID of approval assigned SAPM group/account |
/ldapServerSave | Creating/Editing LDAP server in the Administration/LDAP Manager page | {URL=ldap://10.20.40.120:389, Ldap Source=ldap55} | URL= LDAP server URL, Ldap Source= LDAP server Source Name |
/linuxAuditReport/search | Searching Linux Audit Report event in the Audit Report page | {} | No parameter |
/listAccountsAndGroupsOfSapmGroup | Listing SAPM group's accounts and subs-groups event via API | {dbId=50970} | dbId= DB ID of SAPM group whose accounts and sub-groups are listed |
/listAccountsOfSapmGroupForRest | Listing SAPM group's accounts event via API | {"dbId"= 85202,"applySub"=true } | dbId= DB ID of SAPM group whose accounts are listed, applySub= Given value of listing process to apply to the listing operation on the subgroups of the SAPM Group |
/listGroupsOfSapmGroupForRest | Listing SAPM subs-groups event via API | {dbId=138607} | dbId=DB ID of SAPM group whose subgroups are listed |
/listPermissionOfSapmGroup | Listing SAPM group's permissions event via API | {dbId=3686} | dbId= DB ID of SAPM group whose permissions are listed |
/listPermissionsOfAccount | Listing permission of the SAPM account event via API | {dbId=11236} | dbId= DB ID of SAPM account whose permissions are listed |
/listSapmAccountsOfGroup | Listing SAPM accounts in a group event via API | {"dbId"= 6990, "applySub"= true} | dbId= DB ID of SAPM group whose accounts are listed, applySub= Given value of listing process to apply to the listing operation on the subgroups of the SAPM Group |
/listSapmConfigs | Listing all SAPM configs event via API | {-46670=CheckPoint R80.10, -75631=Huawei ATN 910C Router, -1003887=Twitter, -74986=GENBAND Q21 SBC, -75911=Juniper vMX Series, -265948=Juniper vMX Series SSH Key, -75833=Huawei NE40-X8 Router, -627337=WinRM, -190821=VMWare ESXi - Root User, -412267=PostgreSQL, -141739=SAP HANA, -186400=Ericsson SGSN-MME OM_ADMIN Account, -306414=SAP Sybase, -1005270=Github, -412262=Oracle DB, -42021=openSUSE} | Congid ID=Name listed for all defined SAPM configs |
/listSapmGroups | Listing all SAPM groups events via API | {14251=Group1, 13827=GroupA, 70679=Static Group} | Sapm Group dbID= listed SAPM Group names |
/log/cli-sessions/search | Searching sessions log event in the Logging/Session Log page | {negativeUsername=false, sessionAuditModels=[], negativeHost=false, negativeDeviceGroup=false, hostIp=, sessionEndTime=Tue Oct 27 17:59:59 GMT-03:00 2020, sessionStartTime=Mon Oct 26 18:00:00 GMT-03:00 2020, userName=, recordLimit=2001} | negativeUsername=Excluded selected user status, sessionAuditModels=has default value as null, negativeHost=Excluded selected host status, negativeDeviceGroup=Excluded selected device groups status, hostIp=Host IP entered, sessionEndTime=Session end time, sessionStartTime=Session start time, userName=Username entered to be searched, recordLimit= Search limitation to be listed (has default value) |
/log/tacacs-account/search | Searching Tacacs account event in the Logging/Tacacs Account Log page | {negativeUsername=false, negativeHost=false, negativeDeviceGroup=false, hostIp=, sessionEndTime=Fri Nov 20 17:59:59 GMT-03:00 2020, sessionStartTime=Thu Nov 19 18:00:00 GMT-03:00 2020, recordLimit=5001} | negativeUsername=Excluded selected user status, negativeHost=Excluded selected hosts status, negativeDeviceGroup=Excluded selected device groups status, hostIp=Host IP entered, sessionEndTime=Session end time, sessionStartTime=Session start time, userName=Username entered, recordLimit= Search limitation to be listed (has default value) |
/log/user-auth/search | Searching user authentication log event in the Logging/User Auth. Log page | {userGroups=[], negativeUsername=false, filterEmptyUsernames=true, negativeUserGroup=false, startTime=Thu Nov 19 18:00:00 GMT-03:00 2020, endTime=Fri Nov 20 17:59:59 GMT-03:00 2020, recordLimit=2001} | userGroups=User groups entered to be searched, negativeUsername=Excluded selected usernames status, filterEmptyUsernames=true, negativeUserGroup=Excluded selected user groups status, startTime= Session start time, endTime=Session end time, recordLimit=Search limitation to be listed (has default value)} |
/mail/send | Sending mail event | {templateDataModel={manager=com.kron.netright.kernel.internal.UserImpl@d048dfb9, isGroupAdded=true, updaterUser=com.kron.netright.kernel.internal.UserImpl@667dd00e, updatedUser=com.kron.netright.kernel.internal.UserImpl@d048dfb9, group=com.kron.netright.kernel.internal.GroupImpl@a482438f}, contentTemplate=userGroupChanged, header=text/html; charset=UTF8, [email protected], [email protected], locale=en} | templateDataModel= Mail content information (depends on triggered event), header=header format, charset=character set format, from=sender email address, contentTemplate=Mail type (like policyConnectionApproval, userGroupChanged), toList=recipient mail address |
/makeReservation | Making reservation for SAPM account in the SAPM Manager page | {SecondPartUsername=admin, RemindBeforeInMins=1, endDate=Mon Oct 26 23:08:00 GMT-03:00 2020, sapmDbId=452373, comment=333, FirstPartUsername=admin, startDate=Mon Oct 26 22:38:00 GMT-03:00 2020, userEid=admin} | SecondPartUsername=User who can see the second part of password, RemindBeforeInMins= Reminder minute before the reserved date of the password, endDate=Password Reservation End date, sapmDbId= Sapm Account DB ID, comment=comment entered when creating the reservation, FirstPartUsername=User who can see the first part of the password, startDate=Password Reservation Start date, userEid=username who created the reservation |
/policy/agent-profile/search | Searching agent profile event in the Policy Control/Session Policy page | {} | No parameter |
/policy/assignedCredential/save | Creating assigned credential event in the User Management/Assigned Credential page | {dbId=104734} | dbId=DB ID of the assigned credential |
/policy/assignedCredential/search | Searching assigned credential event in the User Management/Assigned Credential page | {} | No parameter |
/policy/authentication/view/search | Searching policy authentication event in the Policy Control/Policy Tracking page | {deviceOptionSelected=true, deviceGroupOptionSelected=true, userGroupOptionSelected=true, allowConsoleAccess=false, userOptionSelected=true, allowDirectAccess=false, deviceIpOrPatternOrSubnet=, userEid=SQLPROXY} | deviceOptionSelected=Status of device option selection, deviceGroupOptionSelected=Status of device group option selection, userGroupOptionSelected=Status of user group option selection, allowConsoleAccess=Value (true/false) of allowance of console access to be searched, userOptionSelected=Status of user option selection, allowDirectAccess=Value (true/false) of allowance of direct access to be searched, deviceIpOrPatternOrSubnet=Entered DeviceIP or Pattern or Subnet Info to be searched, userEid= Name of user to be searched |
/policy/authorization/view/search | Searching policy authorization event in the Policy Control/Policy Tracking page | {applicationUsageType=sshTelnetPolicy, deviceOptionSelected=true, deviceGroupOptionSelected=true, userGroupOptionSelected=true, userOptionSelected=true, deviceId=6544, userEid=admin} | deviceOptionSelected=Status of device option selection, userGroupOptionSelected=Status of user group option selection, userOptionSelected=Status of user option selection, userEid=Name of user to be searched |
/policy/blackKey/save | Creating/Editing Black Key event in the Policy Control/Session Policy page | {value=key=ls -art, type=BLACK} | value=key= Key of the saved/edited Policy key, type=Type of the key with default value "BLACK" |
/policy/group/search | Searching policy group event in the Policy Control/Session Policy page | {name=test, policies=[pwd], keepPolicyGroup=true, snmp=false, email=false} | name= name of the policy group to be searched, policies= policy keys to be searched, keepPolicyGroup=has default value as true, snmp=Status of option to send snmp trap, email=Status of option to send email alert option |
/policy/key/search | Searching policy key event in the Policy Control/Session Policy page | {elementType=[Linux Server], key=pwd} | elementType= Selected element types to search in policy keys, key= characters to search by policy key |
/policy/permit-zone/search | Searching permit zone event in the Policy Control/Session Policy page | {} | No parameter |
/policy/policyGroup/delete | Deleting policy group event in the Policy Control/Session Policy page | {value=PolicyGroupImpl{name='redoss', policyKeys=[key=(a|aa)+, type=BLACK, key=date, type=BLACK], httpPolicies=[], maskingPolicies=[], timeRestrictions=[], rdpProfiles=[], agentProfiles=[]}} | value=PolicyGroupImpl{name= Name of the deleted policy group, policyKeys=policy keys in the deleted policy group, httpPolicies=HTTP policies in the deleted policy group, maskingPolicies= Masking policies in the deleted policy group, timeRestrictions=Time Restriction policies in the deleted policy group, rdpProfiles=RDP profiles int the deleted policy group |
/policy/policyGroup/save | Creating/Editing policy group event in the Policy Control/Session Policy page | {value=PolicyGroupImpl{name='test pg', policyKeys=[key=ls -art, type=BLACK, key=.*, type=WHITE], httpPolicies=[], maskingPolicies=[], timeRestrictions=[], rdpProfiles=[]}} | value=PolicyGroupImpl{name= saved policy group name, policyKeys=Selected keys for the saved policy group, httpPolicies=Selected HTTP policies for the saved policy group, maskingPolicies= Selected masking policies for the saved policy group , timeRestrictions=Selected time restriction policies for the saved policy group, rdpProfiles=Selected RDP profiles for the saved policy group |
/policy/policyRealm/delete | Deleting policy realm in the Policy Control/Session Policy page | {value=PolicyRealmName=test_policy_realm, policyGroups=[PolicyGroupImpl{name='test_policy_group', policyKeys=[key=ls -art, type=BLACK], httpPolicies=[], maskingPolicies=[], timeRestrictions=[], rdpProfiles=[], agentProfiles=[]}]} | value=PolicyRealmName=deleted policy realm name, policyGroups=[PolicyGroupImpl{name=policy group name in the deleted policy realm, policyKeys=Policy keys in the deleted policy realm, httpPolicies=HTTP policies in the deleted policy realm, maskingPolicies=Masking policies in the deleted policy realm, timeRestrictions=Time restriction policies in the deleted policy realm, rdpProfiles=RDP profiles in the deleted policy realm, agentProfiles=Agent profiles in the deleted policy realm |
/policy/policyRealm/save | Creating/Editing policy realm event in the Policy Control/Session Policy page | {value=PolicyRealmName=test_policy_realm, policyGroups=[PolicyGroupImpl{name='test_policy_group', policyKeys=[key=ls -art, type=BLACK], httpPolicies=[], maskingPolicies=[], timeRestrictions=[], rdpProfiles=[], agentProfiles=[]}]} | value=PolicyRealmName= saved policy realm name, policyGroups=[PolicyGroupImpl{name=Name of the group that includes the saved policy realm, policyKeys=Selected policy keys for the saved policy realm, httpPolicies=Selected HTTP policies for the saved policy realm, maskingPolicies=Selected masking policies for the saved policy realm, timeRestrictions=Selected time restriction policies for the saved policy realm, rdpProfiles=Selected RDP profiles for the saved policy realm, agentProfiles=Agent profiles for the saved policy realm |
/policy/rdp-profile/search | Searching RDP profile event in the Policy Control/Session Policy page | {} | No parameter |
/policy/realm/search | Searching policy realm event in the Policy Control/Session Policy page | No Parameter | No parameter |
/policy/session/disconnected | Killing active sessions event in the Policy Control/Active Session page | {sessionUser=testuser, description=All sessions of user are disconnected} | sessionUser=Name of the user whose connection is disconnected , description= Disconnection description |
/policy/timeRestriction/save | Creating/Editing time restriction event in the Policy Control/Session Policy page | {value=TimeRestrictionName=asd, startTime=00:00, endTime=23:59} | value=TimeRestrictionName=Created/Edited time restriction policy name,startTime=Starting time of the time restriction policy, endTime= Ending time of the time restriction policy |
/policy/time-restriction/search | Searching time restriction event in the Policy Control/Session Policy page | {saturday=false, startTimeHm=00:00, timeZone=Europe/Istanbul, thursday=true, creationDate=Sat Dec 12 09:20:28 GMT+03:00 2020, type=Time Restriction, endTimeHm=23:59, userCreate=admin, sunday=false, tuesday=false, dbId=314248, name=time, wednesday=true, friday=false, displayField=time - Time Restriction, allowedDays=4-5-, monday=false} | sunday=Whether the day is selected or not for the time zone policy searched, saturday=Whether the day is selected or not for the time zone policy searched, tuesday=Whether the day is selected or not for the time zone policy searched, wednesday=Whether the day is selected or not for the time zone policy searched, thursday=Whether the day is selected or not for the time zone policy searched, friday=Whether the day is selected or not for the time zone policy searched, timeZone= Selected Time zone for the time zone policy searched , startTimeHm=Starting time for the time zone policy searched, endTimeHm= Ending time for the time zone policy searched, monday=Whether the day is selected or not for the time zone policy searched, creationDate=Creation Date of the time restriction, type=Policy type with the default value “time restriction”, userCreate=username who created the time restriction policy, dbId=time restriction policy DB ID, name=Time restriction policy name, displayField= Time restriction policy display name, allowedDays=Allowed days with number format for the time restriction policy |
/policy/whiteKey/save | Creating/Editing White Key event in the Policy Control/Session Policy page | {value=key=.*, type=WHITE} | value=key= Key of the saved/edited Policy key, type=Type of the key with the default value of "WHITE" |
/portal-functions/group/search | Searching portal functions group event in the Policy Control/Portal Functions page | No Parameter | No parameter |
/portal-functions/realm/search | Searching portal functions realm event in the Policy Control/Portal Functions page | No Parameter | No parameter |
/resetPassword | Resetting SAPM account's password event | {dbId=452646} | dbId= DB ID of the SAPM account whose password was reset |
/sapm/account/delete | Deleting SAPM account event in the SAPM Management page | {configName=Linux, owner=admin, deviceIp=10.20.42.18, secretName=berrutest, description=berrutest, deviceId=75572723-955b-4b14-b8ed-dd0cca046de0, deviceHostname=10.20.42.18, nextChangeTime=27.10.2020 10:04 (GMT-03:00), secretType=STATIC, lastChangeTime=26.10.2020 10:04 (GMT-03:00), changePeriod=05d 00h 00m, username=berrutest} | configName= Deleted SAPM account configuration name, owner=Deleted the SAPM account owner name, deviceIp=deleted SAPM account device IP, secretName=deleted SAPM account secret name, description=deleted SAPM account description, deviceId=deleted SAPM account device ID, deviceHostname=deleted SAPM account Host name, nextChangeTime= deleted SAPM account next password change time, secretType=deleted SAPM account secret type, lastChangeTime= deleted SAPM account last password change time, changePeriod= deleted SAPM account password change period, username=deleted the SAPM account Username |
/sapm/account/password/changed | Changing SAPM accounts' password event | {configName=Linux, owner=admin, deviceIp=10.20.42.63, secretName=SAPM_d, nextChangeTime=02.10.2024 03:03 (GMT-03:00), secretType=DYNAMIC, lastChangeTime=23.10.2020 03:03 (GMT-03:00), changePeriod=1440d 00h 00m, deviceId=1ec9187a-382a-4242-af59-38f5539ce1f6, deviceHostname=10.20.42.63, username=tom123} | configName=Configuration name of the SAPM account whose password has been changed, owner=Owner name of the SAPM account whose password has been changed, deviceIp=SAPM account device IP, secretName=Secret name of the SAPM account whose password has been changed, nextChangeTime=Next password change time of the SAPM account whose password has been changed, secretType=SAPM account Secret type, lastChangeTime=Last password change time of the SAPM account whose password has been changed, changePeriod=SAPM account Password change period, deviceId=Device ID of the SAPM account whose password has been changed, deviceHostname=SAPM account host name, username=Username of the SAPM account whose password has been changed |
/sapm/account/save | Creating/Editing SAPM account event in the SAPM Management page | {configName=Static Secret Data, owner=admin, secretName=SECRET DATA, nextChangeTime=24.10.2020 02:56 (GMT-03:00), secretType=STATIC, lastChangeTime=23.10.2020 02:56 (GMT-03:00), changePeriod=00d 00h 00m, username=} | configName= Configuration name of the created/edited SAPM account, owner=Owner of the created/edited SAPM account, secretName= secret name of the created/edited SAPM account, nextChangeTime=Next password change time of the created/editted SAPM account, secretType=Secret type for the created/edited SAPM account, lastChangeTime=Last password change time of the created/edited SAPM account, changePeriod= Change period of the created/edited SAPM account |
/sapm/account/search | Searching SAPM account event in the SAPM Management page | {changePeriod=00d 00h 00m, secretType=STATIC} | changePeriod=value of the SAPM Account change period to search, secretType= secret Type Value to search |
/sapm/auto/import/rule/save | Creating/Editing SAPM auto-import rules event in the SAPM Management/Auto-Import Rules page | {configName=Windows, deviceGroupId=6434819, isRecreateWhenSerialNumberIsChanged=false, ruleName=as, deviceGroupName=testedted, elementTypeId=windows, isActive=false, changePeriod=02d 00h 00m, username=irem} | configName=Selected configuration name for the auto import rule, deviceGroupId=selected device group DB ID, isRecreateWhenSerialNumberIsChanged=Status of recreating when serial number is changed:, ruleName=Name of the rule, deviceGroupName= Selected device group name, elementTypeId=Selected element type ID, isActive=Whether the auto import rule is active or not, changePeriod=The change period determined for the selected SAPM account password change, username=selected SAPM account username |
/sapm/auto/import/rule/search | Searching SAPM auto-import rules event in the SAPM Management/Auto-Import Rules page | {isActive=false, changePeriod=00d 00h 00m, isRecreateWhenSerialNumberIsChanged=false} | isActive=Whether the active button is selected or not, changePeriod=The entered change period of the SAPM Accounts to be searched, isRecreateWhenSerialNumberIsChanged= Whether the button Recreate When Serial Number Is Changed is selected or not |
/sapm/config/delete | Deleting SAPM configuration event in the SAPM Management page | {name=xxxx, description=Linux, strategy=SSH, configId=779230} | name=deleted SAPM configuration name, description=deleted configuration description, strategy=deleted SAPM configuration strategy, configId=deleted SAPM configuration DB ID |
/sapm/config/save | Creating/Editing SAPM configuration event in the SAPM Management page | {name=Linux, description=Linux, strategy=SSH, configId=-9077} | name=saved configuration name, description=saved configuration description, strategy=saved configuration strategy, configId=saved configuration DB ID |
/sapm/config/search | Searching SAPM configuration event in the SAPM Management page | {} | No parameter |
/sapm/group/delete | Deleting SAPM group event in the SAPM Management page | {groupName=AA11} | groupName=deleted SAPM group name |
/sapm/new/users/log/search | Searching SAPM new user's log event in the SAPM Management page | {deviceIp=10.20.42.19, nextChangeTime=11.12.2020 23:59:59 (GMT+03:00), newUser=elif, lastChangeTime=11.12.0202 01:04:08 (GMT+03:00)} | deviceIp= Device IP to search, nextChangeTime=end time limit of the log to search, lastChangeTime=start time limit of the log to search |
/sapm/password/change/log/history/search | Searching SAPM password change log history event in the SAPM Management page | {deviceIp=10.20.42.60, nextChangeTime=06.11.2020 23:59:59 (GMT+03:00), lastChangeTime=14.07.2020 00:00:00 (GMT+03:00), username=irem1} | deviceIp= IP of the device to search in the SAPM change history log, nextChangeTime= end time limit of the log to search, lastChangeTime= start time limit of the log to search, username=name of the SAPM account whose password history is searched |
/sapm/password/change/log/search | Searching SAPM password change log event in the SAPM Management page | {nextChangeTime=28.10.2020 17:59:59 (GMT-03:00), lastChangeTime=27.10.2020 18:00:00 (GMT-03:00)} | nextChangeTime= end time limit of the log to search, lastChangeTime=start time limit of the log to search |
/sapm/password/check/log/search | Searching SAPM password check log event in the SAPM Management page | {nextChangeTime=16.10.2020 23:59:59 (GMT+03:00), lastChangeTime=05.05.2020 00:00:00 (GMT+03:00)} | nextChangeTime=end time limit of the log to search, lastChangeTime=start time limit of the log to search |
/sapm/reservation/delete | Deleting SAPM account's password reservation event in the SAPM Management page | {reservationStartTime=2020-11-23 05:17:00.0, reservationEndTime=2020-11-23 05:22:00.0, reservationId=273431, remaindBeforeTime=Mon Nov 23 05:02:00 GMT-03:00 2020, sapmAccountId=99914} | reservationStartTime=reservation starting time, reservationEndTime= reservation ending time, reservationId=password reservation DB ID, remaindBeforeTime=password reservation reminder time, sapmAccountId=DB ID of the SAPM account with the deleted reservation |
/sapm/reservation/search | Searching SAPM account's password reservation event in the SAPM Management page | {reservationStartTime=Sat Dec 11 01:04:08 GMT+03:00 202, reservationEndTime=Fri Dec 11 23:59:59 GMT+03:00 2020, sapmAccountId=127591} | reservationStartTime= start time limit to search reservationEndTime= end time limit to search, sapmAccountId=DB ID of the SAPM account whose password reservation is searched |
/SAPMGroup/saved | Creating/Editing SAPM group event in the SAPM Management page | {groupName=KRON} | groupName = Created/Edited SAPM group name |
/sapmShowPassword | Showing SAPM account's password event in the SAPM Management page | {dbId=452373} | dbId= DB ID of the SAPM account whose password was shown |
/sdd/discovery/search | Searching sensitive data discovery event in the Sensitivity Data Discovery page | {schema=SQLPROXY, expectedMatchPercentage=80, database=Oracle 11g Database, tables=[EMPLOYEES], sampleDataCount=20, patterns=[{regex=^(?:4[0-9]{12}(?:[0-9]{3})?|[25][1-7][0-9]{14}|6(?:011|5[0-9][0-9])[0-9]{12}|3[47][0-9]{13}|3(?:0[0-5]|[68][0-9])[0-9]{11}|(?:2131|1800|35\\d{3})\\d{11})$, validationType=Credit Card Number, name=Credit Card, type=Sample Data}, {regex=[A-Za-z0-9._%-]+@[A-Za-z0-9._%-]+\.[A-Za-z]{2,4}, validationType=Pattern, name=E-Mail, type=Sample Data}]} | schema=Selected Schema for Sensitive Data Discovery, expectedMatchPercentage=Expected match percentage for discovered data, database=Selected Database for Sensitive Data Discovery, tables=Selected Tables for Sensitive Data Discovery, sampleDataCount=Sample Data Count to be discovered in selected database, patterns=[{regex=regex to be matched data for Sensitive Data Discovery, validationType=Validation type name in defined Kron PAM, name=Validation Pattern Name, type=Validation pattern type |
/sdd/pattern/search | Searching sensitive data discovery pattern event in the Sensitivity Data Discovery page | {name=email} | name= Name of the pattern to be searched |
/SdvGroup/saved | Creating/Editing secret data vault group in the Secret Data Vault page | {groupName=test} | groupName= Group name of the saved secret data vault |
/searchSapmAccounts | Searching SAPM account event via API | {13924=sapm1} | Sapm Account DB ID=SAPM Account name listed according to search phrase |
/searchSapmConfig | Searching SAPM configuration event via API | {-9077=Linux, -307082=Linux SSH Key, -40829=SUSE Linux Enterprise, -40893=SUSE Linux Enterprise SSH Key} | Congid ID=Name listed according to search phrase |
/secret/data/vault/delete | Deleting secret data vault record event in the Secret Data Vault page | {name=test, ipAddress=0.0.0.0, description=asd, type=Other} | name=deleted secret data vault name, ipAddress=deleted secret data vault IP address, description=deleted secret data vault description, type=deleted secret data vault type |
/secret/data/vault/group/deleted | Deleting group of secret data vault event in the Secret Data Vault page | {groupName=test} | groupName=deleted secret data vault group name |
/secret/data/vault/save | Creating/Editing secret data vault event in the Secret Data Vault page | {name=test, ipAddress=0.0.0.0, description=asd, type=Other} | name=saved secret data vault name, ipAddress=saved secret data vault IP address, description=saved secret data vault description, type=saved secret data vault type |
/secret/data/vault/search | Searching secret data vault event in the Secret Data Vault page | {} | No parameter |
/secret/data/vault/show | Showing secret data vault event in the Secret Data Vault page | {name=tested, comment=request, type=Other} | name=Name of the secret data vault selected to show secret, comment=Comment for viewing the secret, type=Type of secret data vault selected to show secret |
/setApprovalManagersForSapmAccount | Setting list of approvers of an SAPM account event via API | {sapmDbId=452373, managers=[24ad7d47-aa17-4cf9-89c2-0a07f55bc7f4]} | sapmDbId= DB ID of SAPM account to which approval managers were assigned, managers=User ID of users assigned as approval managers on the SAPM account |
/setApprovalManagersForSapmGroup | Setting a list of approval managers of an SAPM group event via API | {DbId=451986} | dbId= DB ID of SAPM group to which approval managers were assigned |
/setPermissionForGroup | Setting SAPM group's permissions event via API | {DbId=452064, newPermission={6b91ccd6-3fd3-4275-b7e1-1b1acfb09d48=FULL_CONTROL}} | DbId=DbId of SAPM group with the new permissions assigned, newPermission= Given permissions to the SAPM accounts with the value {User Group ID=Permission Type} |
/showOldPassword | Showing old password record of each SAPM account event via API | {dbId=452636} | dbId= DB ID of SAPM account whose password history was shown |
/showOldPasswordRecordsForAccount | Showing old password record of each SAPM account event | {endDate=Sat Oct 24 09:35:00 GMT-03:00 2020, sapmDbId=452373, startDate=Thu Oct 22 09:05:00 GMT-03:00 2020} | endDate=End time limit of showing old password records, sapmDbId= DB ID of SAPM account whose password record has been shown, startDate=Start time limit of showing password records |
/system/config/delete | Deleting system configuration parameter event | {parameterValue=false, parameterName=sapm.admin.manage.all.accounts} | parameterValue=deleted parameter value, parameterName= Deleted parameter name |
/system/config/save | Creating/Editing system configuration parameter event | {parameterValue=0, parameterName=aioc.users.default.password.strength} | parameterValue=saved system config parameter value, parameterName=Saved parameter name |
/system/config/search | Searching system configuration parameters event | {parameterValue=en_US, parameterName=aioc.languages} | parameterName=characters to search by parameter name, parameterValue=characters to search by parameter value |
/tfa/lastOtp | Checking user’s last OTP used time event (this event occurs when the OTP cache time is set on the related application) | {endUserIp=10.20.42.27, applicationName=rdp-proxy} | endUserIp=end user IP, applicationName=Name of the application whose OTP cache time was being checked when using two-factor authentication |
/tfa/otpStatus | Checking if 2FA is enabled event for the user | {authDb=false, endUserIp=10.20.41.123, user=admin, applicationName=SC-LOGIN-UI, clientIp=10.20.41.123} | {authDb=has default value as false, endUserIp=Ip of end user, user=username whose OTP status was checked, applicationName=Name of the application that was checked for activation status of two-factor authentication , clientIp= IP that sent the request for OTP} |
/tfa/otpValid | Applying OTP validation event for a user | {Token=****, applicationName=scproxy} | Token=used token (shown as masked), applicationName=Name of the application that used two-factor authentication |
/updatePassword | Updating password event | {dbId=652242} | dbId= DB ID of the user whose password was updated |
/user/delete | Deleting user event in the User Management/User Account page | {userName=joe.doe} | userName = Deleted user's name |
/user/lock | Locking user event in the User Management/User Account page | {lockedUser=testuser, lockReason=Locked by admin} | lockedUser=Locked user's username, lockReason=Shows lock reason |
/user/passwordchange | Changing user’s password event in the User Management/User Account page | {userName=admin, password=****} | userName=Username of the user whose password has been changed, password=new password (shown as masked) |
/user/passwordreset | Resetting user's password event in the User Management/User Account page | {userName=tested7, password=****} | userName=Username of the user whose password was reset, password= new password (shown as masked) |
/user/save | Creating/Editing user event in the User Management/User Account page | {isInternal=true, password=****, surname=111, name=os.expert1, userName=os.expert1, [email protected], addedGroups=[System.users]} | isInternal=Value indicating the saved user is an internal user or an external (LDAP) user, password=new password (shown as masked), surname=saved new user surname, name=saved user name, userName=saved user username, email=saved user email, addedGroups= User groups to which the saved user was added |
/user/search | Searching user event in the User Management/User Account page | {internal=true, keepUserGroups=true, tempUser=false, recordLimit=1001, isPasswordAutoGenerated=false} | internal=default value is true, keepUserGroups=default value is true, tempUser=Value of temporary users selection to search by temporary users, recordLimit=Search limitation to be listed (has default value), isPasswordAutoGenerated=default value is false |
/user/unlock | Unlocking user event in API | {unlockedUser=testuser} | unlockedUser=Unlocked user's username |
/user/update | Updating user event in the User Management/User Account page | {userName=admin} | userName=Updated user's name |
/user-approval/search | Searching user approval requests event | {status=WAIT} | status=Selected user approval status to search |
/userRealm/delete | Deleting Portal Function user realm event | {realmName=test} | realmName=deleted realm name |
/userRealm/save | Creating/Editing Portal Function user realm event | {userGroups=hw-experts,os-experts,, functionGroups=Policy Control,AAPM Management,SAPM Group Module Visibility,SAPM Management,2fa,, realmName=sapm-users} | userGroups= Name of the user groups added to the saved realm, functionGroups= Selected function groups to assign the saved realm to, realmName=saved realm name |
/windowsAuditReport/search | Searching Windows Audit Report event in the Audit Report page | {} | No parameter |