...
Field | Description |
---|---|
Event Management Options | Delete Persistent events after |
Event Generation Options | Generate Activity monitoring events
Entries are processed from left to right, and the list is order dependent. For example, an entry of x*,100 prevents generation of all event types except 100, while an entry of 100,x* prevents generation of all event types (the right-most entry takes precedence). |
...
Field | Description |
---|---|
Certificate Map ACL List Box | Displays the entries contained in the X.509 certificate mapping. The order in which entries are evaluated and applied are based on their position in this list. Use the Move Up and Move Down buttons to change an entry's priority. |
Add Button | Displays a dialog box that allows an entry to be added to the Access Control List. The fields in this dialog are populated with default values.
The following are examples of Distinguished Names:E-Mail Address
E-Mail Address |
Edit Button | Displays a dialog that allows the selected Access Control List entry to be modified.
The following are examples of Distinguished Names:
E-Mail Address |
Delete Button | Removes the selected item from the Access Control List. |
Move Up Button | Moves the selected item up one position in the list. |
Move Down Button | Moves the selected item down one position in the list. |
...