Trusted Solaris Developer's Guide

Third-Party User Activities

Third-party applications audit user activities by creating third-party audit events and audit classes specific to the application and generating audit records with those events using the auditwrite(3TSOL) routine.

The application programmer defines the third-party audit events and classes used in third-party applications, and the system administrator at the site using the application sets up the above-referenced files to recognize the new events and classes.

Within the application, audit events are generated and logged to the audit trail in records. Audit records contain tokens that provide the audit event and other relevant information such as the process ID of the process that generated the event, the machine on which the event occurred, and the date and time. The audit trail is the place where audit records generated by the kernel, system applications, and third-party applications are stored in files. The following figure presents these elements and their relationships.

Figure 8-1 Audit Trail, Files, Records, and Tokens

Graphic

It is up to you to decide exactly what information is logged to the audit record by deciding which tokens are passed to the auditwrite(3TSOL) routine. Audit records should be generated in third-party applications in the highest possible interface layer where the most precise information is available, and there is more opportunity to limit the generation of less useful audit records.