Auditable events

User authentication events

All of the following events provide valuable information about the users on your system. The bad_auth event records all attempts to login that fail because of an invalid password or login name. A high number of such failures may indicate that someone who does not know a valid login name or password is trying to log in. It is especially important to audit this event if you have dial-up terminal ports on your system. If you choose to audit the bad_auth, event, it must be set in the system-wide event mask, not in a specific user event mask. The event records failed login attempts, and a user event mask takes effect only once a user has successfully logged on.

User authentication events

Event Description Manual page Object audit
bad_auth bad login name/password login(1) N
bad_lvl bad login level login(1) N
cron cron job cron(ADM) N
def_lvl change a user's default level login(1) N
login use a login schema login(1) N
logoff terminate a login session NA N
passwd change password passwd(1) N


Next topic: I/O control events
Previous topic: Process control events

© 2005 The SCO Group, Inc. All rights reserved.
SCO OpenServer Release 6.0.0 -- 03 June 2005