Explain How the Access Server Logs Authentication Requests
(Doc ID 416812.1)
Last updated on MARCH 08, 2017
Applies to:COREid Access - Version: 6.1.1 to 22.214.171.124 - Release: to 126.96.36.199
Information in this document applies to any platform.
Checked for relevance on 12-Apr-2010
1. Does webgate invoke the "netpoint none auth" scheme for each request to GET the resource under a certain folder (ex: /images) or is it only done for the first reference for the file?
2. If the master audit rule mandates that every authentication and authorization success be logged, for every request to somepage.html containing links to 50 image files under the folder /images, will the access-server log 51 successful authorizations? (one for each of the 50 image files and one for the somepage.html file? or is there some buffer that is used?
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document
|This document is being delivered to you via Oracle Support's Rapid Visibility (RaV) process and therefore has not been subject to an independent technical review.|