Oracle Waveset 8.1.1 Business Administrator's Guide

Audit Log Database Mappings

Table B–5 contains the mappings between stored audit log database keys and the display string to which they map in the audit report output. Waveset stores items that are used as constants as short database keys to save space in the repository. The product interface does not display these mappings. Instead, you see them only when examining the output of a dump of the audit report results.

Table B–6 contains the auditable action database keys, Table B–7 contains the action status keys, and Table B–8 contains the reason codes that are stored in the database as keys.

Table B–5 Object Key-Type Database Keys

Type Name  

English Text  

DbKey  

AccessReview

AccessReview

AV

AccessReviewWorkflow*

Access Review Workflow

AW

AccessScan

AccessScan

AS

Account

Account

AN

AdminGroup

Capability

AG

Administrator

Administrator

AD

AdminRole

Admin Role

AR

Application

Resource Group

AP

AttributeDefinition

AttributeDefinition

AF

AttrParse

AttrParse

AT

AuditConfig

AuditConfig

AC

AuditPolicy

AuditPolicy

CP

BeanPod

Bean Pod

BP

ComplianceViolation

ComplianceViolation

CV

Configuration

Configuration

CN

DataExporter

Data Exporter

DE

Discovery

Discovery

DS

Email*

Email

EM

EmailTemplate

EmailTemplate

ET

EncryptionKey

EncryptionKey

KY

Event

Event

EV

Extract

Extract

ER

ExtractTask

ExtractTask

EX

IDMXUser*

Directory User

UX

LighthouseAccount*

Identity System Account

LA

LoadConfig

LoadConfig

LD

LoadTask

LoadTask

LT

Log

Log

LG

LoginApp

LoginApp

LP

LoginConfig

LoginConfig

LC

LoginModGroup

LoginModGroup

LF

MetaView

Meta View

MV

ObjectGroup

Organization

OG

Policy

Policy

PO

ProvisioningTask

ProvisioningTask

PT

RemediationWorkflow*

Remediation Workflow

RW

RemedyConfig

RemedyConfig

RC

Resource

Resource

RS

ResourceAccount*

Resource Account

RA

ResourceAction

ResourceAction

RN

ResourceForm

ResourceForm

RF

ResourceObject

ResourceObject

RE

RiskReportTask

RiskReportTask

RR

Role

Role

RL

Rule

Rule

RU

SnapShot

SnapShot

SS

ServerObject

ServerObject

SV

SysLog

SysLog

SL

System

System

SY

TaskDefinition

TaskDefinition

TD

TaskInstance

TaskInstance

TI

TaskResult

TaskResult

TR

TaskResultPage

ResultPage

TP

TaskSchedule

TaskSchedule

TS

TaskTemplate

TaskTemplate

TT

TestNotification*

Test Notification

TN

User

User

US

UserEntitlement

UserEntitlement

UE

UserForm

UserForm

UF

WorkflowCase*

Workflow Case

WC

WorkItem

WorkItem

WI

XmlData

XmlData

XD

[* Extended Types]

Table B–6 Action Database Keys

Action Name  

English Text  

DbKey  

Allowed*

Allowed

AL

Approve

Approve

AP

Assign Audit Policies

Assign Audit Policies

AA

Assign Capabilities

Assign Capabilities

AC

AttestorApproved*

Attestor Approved

TA

AttestorRejected*

Attestor Rejected

AR

AttestorRemediate*

Remediation Requested

AF

AttestorRescan*

Rescan Requested

AN

Bulk Change Password

Bulk Change Password

BW

Bulk Create

Bulk Create

BC

Bulk Delete

Bulk Delete

BD

Bulk Deprovision

Bulk Deprovision

BP

Bulk Disable

Bulk Disable

BF

Bulk Enable

Bulk Enable

BE

Bulk Modify

Bulk Modify

BM

Bulk Reset Password

Bulk Reset Password

BR

Bulk Unassign

Bulk Unassign

BU

Bulk Unlink

Bulk Unlink

BL

Bypass Verify

Bypass Verify

BV

CancelReconcile*

Cancel Reconcile

CR

challengeResponse*

Challenge Response

CD

Change Password

Change Password

CP

Connect

Connect

CN

Control Active Sync

Control Active Sync

CA

Create

Create

CT

CredentialsExpired*

Credentials Expired

CE

Debug

Debug

DB

Delegate

Delegate

DG

Delete

Delete

DL

Deprovision

Deprovision

DP

Disable

Disable

DS

Disconnect

Disconnect

DC

Enable

Enable

EN

End Activity

End Activity

EA

End Process

End Process

PE

End Workflow

End Workflow

EW

Execute

Execute

LN

Expired*

Expired

EX

Export

Export

EP

Fixed*

Fixed

FX

Import

Import

IM

List

List

LI

Lock

Lock

LK

Login

Login

LG

Logout*

Logout

LO

Mitigated*

Mitigated

VM

Modify

Modify

MO

Modify Active Sync

Modify Active Sync

MA

NativeChange*

Native Change

NC

Notify*

Notify

NO

PostOperation*

Post-Operation Callout

PT

PreOperation*

Pre-Operation Callout

PP

Prioritize*

Prioritize

PR

Provision

Provision

PV

Recurring*

Recurring

RC

Reject

Reject

RJ

Remediated*

Remediated

VR

Rename

Rename

RE

RequestReconcile*

Request Reconcile

RR

ResetPassword

ResetPassword

RP

Run Debugger

Run Debugger

RD

ScanBegin*

Scan Begin

SB

ScanEnd*

Scan End

SE

StartActivity*

Start Activity

SA

StartProcess*

Start Process

SP

StartWorkflow*

Start Workflow

SW

Terminate*

Terminate

TR

Unassign

Unassign

UA

Unlink

Unlink

UN

Unlock

Unlock

UL

updateAuthenticationAnswers*

Update Authentication Answers

AQ

usernameRecovery*

Username Recovery

UR

View

View

VW

View Only

View Only

VO

[* Extended Actions]

Table B–7 Action Status Database Keys

Result  

DbKey  

Success

S

Failure

F

Table B–8 Reasons Stored as Keys

Reason Name  

English Text  

DbKey  

PolicyViolation

Violation of policy {0}: {1} 

PV

InvalidCredentials

Invalid Credentials 

CR

InsufficientPrivileges

Insufficient Privileges 

IP

DatabaseAccessFailed

Database Access Failed 

DA

AccountDisabled

Account Disabled 

DI