Cisco Systems Servers Server User Manual


 
Chapter 9 Working with Logging and Reports
Special Logging Attributes
9-2
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
charts or perform queries, such as determining how many hours a user was
logged in to the network during a given period. For information about how to
use a CSV file in a third-party application such as Microsoft Excel, please see
the documentation supplied by the third-party vendor. You can access the
CSV files either on the Cisco Secure ACS server hard drive or by
downloading the CSV file from the HTML interface. For more information
about downloading the CSV file from the HTML interface, see the Viewing
a CSV Report section on page 9-20.
ODBC-compliant database tablesODBC logging enables you to
configure Cisco Secure ACS to log directly in an ODBC-compliant relational
database, where it is stored in tables, one table per log. After the data is
exported to the relational database, you can use the data however you need.
For more information about querying the data in your relational database,
refer to the documentation supplied by the relational database vendor.
For information about the formats available for a specific log, see the About
Cisco Secure ACS Logs and Reports section on page 9-4.
Special Logging Attributes
Among the many attributes that Cisco Secure ACS can record in its CSV or
ODBC logs, a few are of special importance. The following list explains the
special logging attributes provided by Cisco Secure ACS.
User-defined attributesThese logging attributes appear in the Attributes
list for any log configuration page. Cisco Secure ACS lists them using their
default names: Real Name, Description, User Field 3, User Field 4, and User
Field 5. If you change the name of a user-defined attribute, the default name
still appears in the Attributes list rather than the new name.
The content of these attributes is determined by the values entered in the
corresponding fields in the user account. For more information about
user-defined attributes, see the User Data Configuration Options section on
page 3-3.
ExtDB InfoIf the user is authenticated with an external user database, this
attribute contains a value returned by the database. In the case of a Windows
NT/2000 user database, this attribute contains the name of the domain that
authenticated the user.