Previous Page | Next Page

Security Features

Security Reporting and Logging Overview

Security reporting creates a snapshot of metadata-layer access control settings. SAS provides the %MDSECDS autocall macro to enable you to easily build data sets of permissions information. You can use those data sets as the data source for security reports. You can also identify changes in settings by comparing data sets that are generated at different times. See Security Report Macros.

Security logging records security-related events as part of a system-wide logging facility. The following table describes the security log categories:

Logging of Security Events
Category Events Captured
Audit.Authentication Authentication events, client connection information.
Audit.Meta.Security.UserAdm Changes to users, groups, roles, logins, and authentication domains. Includes additions, deletions, modifications, and failed attempts to perform these actions.
Audit.Meta.Security.GrpAdm Changes to memberships (for groups or roles). Includes adding members, removing members, and failed attempts to perform these actions.
Audit.Meta.Security.AccCtrlAdm Changes to permissions, permission settings, ACTs, and passwords.* Includes additions, deletions, modifications, and failed attempts to perform these actions.
Audit.Meta.Security The parent category for security events. Logging settings that you define for this category apply to its child categories.
* This is for passwords on objects such as Tables, Connections, and ProtectedPassthrus.

Previous Page | Next Page | Top of Page