webMethods and Intelligent Business Operations 10.2 | Integrating Cloud Applications | Administering Integration Server | Removing User Data from Integration Server | Removing Personal Data from Log Files | Security Log
 
Security Log
In the security log, the security audit log record includes the userid of the user performing the logged activity. Where that data is located and how to remove it depends on whether the security log destination is a file or a database.
If the security log is a...
Use the following to locate and delete user data...
File
File Location: Software AG_directory \ Integration Server_directory \instances\instance_name\logs
File Name: WMSECURITY_serverStartupTimestamp.log
userid is 64-characters long. It is logged from column 640.
Use a text editor to perform a search and replace for the userid. For example, you could search the security log files for the user name and replace the user name with an anonymous string or a blank string.
Database
If the Security audit logger is configured to log to an external database identified by the ISCoreAudit functional alias, the log message are written into WMSECURITY table of the ISCoreAudit database.
The USERID column contains the userid.
Use the following SQL statement to remove the data:
DELETE FROM WMSECURITY WHERE USERID = 'username'

Copyright © 2015- 2018 | Software AG, Darmstadt, Germany and/or Software AG USA, Inc., Reston, VA, USA, and/or its subsidiaries and/or its affiliates and/or their licensors.
Innovation Release