Display Alert (DSPCCALR)

The DSPCCALR command allows an authorized user to display the settings for a Security Alert entry. 

Do the following steps to view the settings for an Alert:

  1. Prompt (F4) the command CRYPTO/DSPCCALR.
  2. Type in the audit category and sequence number, then press Enter.
  3. The settings for the Alert will be displayed, along with the user and time in which the Alert was added or last changed.
  4. Press F1 on any parameter for complete online help text.

Options

Audit category (AUDITCAT)

Indicates the Audit category to monitor.

The possible values are:

*ALL All audit categories are monitored.
*ALERT Any maintenance to the Security Alert settings will trigger an alert, which includes the following audit types:
  • 35-Alert added.
  • 36-Alert changed.
  • 37-Alert deleted.
*AUTH Any authority errors that are encountered in Powertech Encryption will trigger an alert, which includes the following audit types:
  • 50-Authority error
*DEK Any maintenance to the Data Encryption Keys will trigger an alert, which includes the following audit types:
  • 08-Key Store created.
  • 09-Key Store translated.
  • 10-Symmetric Key created.
  • 11-Symmetric Key changed.
  • 12-Symmetric Key copied.
  • 13-Symmetric Key deleted.
  • 21-Symmetric Key exported.
*FLDREG Any maintenance to the Field Encryption Registry will trigger an alert, which includes the following audit types:
  • 14-Entry added
  • 15-Encryption Key changed
  • 16-Entry removed
  • 17-Entry activated
  • 18-Entry changed
  • 19-Entry deactivated
  • 22-Unable to Activate Entry
  • 23-Unable to Deactivate Entry
  • 24-Entry copied
  • 25-SQL Triggers added to file
  • 26-SQL Triggers removed from file
  • 27-Field keys translated
*IFSREG Any maintenance to the IFS Encryption Registry will trigger an alert, which includes the following audit types:
  • 60-Entry added
  • 61-Encryption Key changed
  • 62-Entry removed
  • 63-Entry activated
  • 64-Entry changed
  • 65-Entry deactivated
  • 66-Unable to Activate Entry
  • 67-Unable to Deactivate Entry
  • 68-Encryption Failed
  • 69-Decryption Failed
  • 70-IFS Monitor Issue
*KEYOFR Any maintenance to the Key Officer settings will trigger an alert, which includes the following audit types:
  • 02-Key Officer added.
  • 03-Key Officer changed.
  • 04-Key Officer removed.
*KEYPCY Any maintenance to the Key Policy settings will trigger an alert, which includes the following audit types:
  • 01-Key Policy setting(s) changed.
*MEK Any maintenance to the Master Encryption Keys will trigger an alert, which includes the following audit types:
  • 05-Master Key passphrase part loaded.
  • 06-Master Key was Set.
  • 07-Master Key cleared.
Sequence number (SEQNBR)

Indicates the sequence number within the Audit Category. Valid sequence numbers range from 001 to 999.

Action (ACTION)

Indicates the Action to perform for the alert.

The possible values are:

*EMAIL Send email to one or more recipients. Uses the SNDDST command.
*MSGQBRK Send break messages to the message queue specified. Uses the SNDBRKMSG command.
*MSGQINF Send information messages to the message queue specified. Uses the SNDMSG command.
*PTGLOG Send log messages to the Protegrity Defiance Enterprise Security Administrator (ESA).
*QAUDJRN Write journal entries into the QAUDJRN journal file.
*QHST Send messages to the QHST log message queue. Uses the SNDMSG command.
*QSYSOPR Send messages to the QSYSOPR message queue. Uses the SNDMSG command.
*SYSLOG Send messages to an external log server using SYSLOG protocol.
*USER Send messages to the user specified. Uses the SNDMSG command.
To user profile (TOUSER)

Valid for *USER action type. Indicates the user profile name to send the alert message to.

To message queue (TOMSGQ)

Valid for *MSGQINF and *MSGQBRK action types. Indicates the message queue name and library to send the alert message to.

The possible library values are:

*LIBL The library list is used to find the message queue.
message-queue-library Specify the library of the message queue.
To email address (TOEMAIL)

Valid for *EMAIL action type. Indicates the email address(s) to send the alert to. Multiple email addresses can be specified by separating them with a comma. Example: john@abc.com,mike@abc.com,jim@abc.com

Log host (LOGHOST)

Valid for *SYSLOG and *PTGLOG action types. The host name or IP address of the log server.

Destination port (LOGSRCPORT)

Valid for *SYSLOG action type. The local port to use when connecting to the log server.

NOTE: When the local port is set to 0, the system will search for an available local port to use.
Destination port (LOGDSTPORT)

Valid for *SYSLOG and *PTGLOG action types. The port for the log server. The default port for syslog servers is 514.

Log facility (LGFACILITY)

Valid for *SYSLOG action type. The log facility. The facility value is a way of determining which process of the machine created the message.

Log severity (LGSEVERITY)

Valid for *SYSLOG action type. The log severity. The severity value is a way of determining the importance of the message.

Client Application (LOGCLNTAPP)

Valid for *PTGLOG action type. The Client Application ID to use. The Client Application is created in the IBM Digital Certificate Manager. This client application links the Client Certificate to use with this application.

Last modified by user (MODUSER)

Indicates the user profile that created or last modified the Security Alert.

Last modified date/time (MODDATETIM)

Indicates the date and time in which the Security Alert settings were last modified.