ix
14.4.2. Managing RA Users ............................................................................. 340
14.5. Creating and Managing Users for a TPS .......................................................... 349
14.5.1. Searching for Users ............................................................................. 349
14.5.2. Adding Users ....................................................................................... 350
14.5.3. Setting Profiles for Users ...................................................................... 351
14.5.4. Changing Roles for Users .................................................................... 352
14.5.5. Renewing TPS Agent and Administrator Certificates ............................... 353
14.5.6. Deleting Users ..................................................................................... 353
14.6. Configuring Access Control for Users for the CA, OCSP, DRM, and TKS ............. 354
14.6.1. About Access Control ........................................................................... 354
14.6.2. Editing ACLs ........................................................................................ 356
15. Configuring Subsystem Logs 359
15.1. An Overview of Log Settings ........................................................................... 359
15.1.1. Services That Are Logged .................................................................... 359
15.1.2. Log Levels (Message Categories) ......................................................... 360
15.1.3. Buffered and Unbuffered Logging .......................................................... 361
15.1.4. Log File Rotation ................................................................................. 362
15.2. Certificate System Logs .................................................................................. 362
15.2.1. System Log ......................................................................................... 362
15.2.2. Transactions Log ................................................................................. 363
15.2.3. Debug Logs ......................................................................................... 363
15.2.4. Error Log ............................................................................................. 365
15.2.5. Installation Logs ................................................................................... 366
15.2.6. Apache and Tomcat Error and Access Logs ........................................... 366
15.2.7. Self-Tests Log ...................................................................................... 367
15.3. Configuring Logs Using the UI ......................................................................... 367
15.3.1. Configuring Logs in the Console (for the CA, OCSP, DRM, and TKS) ....... 367
15.3.2. Configuring TPS Audit Logs in the Admin Services Page ........................ 368
15.4. Configuring Logs in the CS.cfg File .................................................................. 370
15.4.1. Configuring Logs in the CS.cfg File for the CA, OCSP, DRM, and TKS ...... 370
15.4.2. Configuring RA Logging ....................................................................... 371
15.4.3. Configuring TPS Logging ...................................................................... 373
15.5. Managing Signed Audit Logs ........................................................................... 376
15.5.1. Configuring a Signed Audit Log for a CA, OCSP, DRM, or TKS ................ 376
15.5.2. Configuring TPS Signed Audit Logging .................................................. 379
15.5.3. Handling Audit Logging Failures ............................................................ 381
15.5.4. Signing Log Files ................................................................................. 382
15.6. Viewing Logs .................................................................................................. 382
15.7. Smart Card Error Codes ................................................................................. 383
15.8. Managing Log Modules ................................................................................... 384
15.8.1. Registering a Log Module ..................................................................... 384
15.8.2. Deleting a Log Module ......................................................................... 385
16. Managing Subsystem Certificates 387
16.1. Required Subsystem Certificates ..................................................................... 387
16.1.1. Certificate Manager Certificates ............................................................ 387
16.1.2. RA Certificates ..................................................................................... 389
16.1.3. Online Certificate Status Manager Certificates ........................................ 389
16.1.4. Data Recovery Manager Certificates ..................................................... 391
16.1.5. TKS Certificates ................................................................................... 392
16.1.6. TPS Certificates ................................................................................... 393