13 Commits

Author SHA1 Message Date
Paweł Słomka
276ad1f529 Cleanup of deprecated commands in tests, docs (#3788) 2018-01-15 15:19:28 -05:00
Seth Vargo
965b8809e3
Audit backend -> device 2017-10-24 09:30:52 -04:00
Harrison Harnisch
6da4806582 add socket audit backend 2017-02-02 14:21:48 -08:00
vishalnayak
30a67c13fb Fix file_path argument in audit's index.html 2017-01-18 21:43:29 -05:00
Laura Bennett
f8bc3b125e website update for request uuuid 2016-07-24 21:23:12 -04:00
Gérard de Vos
57215ac0aa Update index.html.md
According to the source it is expecting a description. log_raw is one of the options.
2016-03-31 14:19:03 +02:00
Gérard de Vos
f0e3d4abb3 Update index.html.md
description -> log_raw
2016-03-31 14:06:19 +02:00
vishalnayak
65bef4014d Remove redundant variables 2016-03-11 21:36:38 -05:00
vishalnayak
2275c3b844 Doc update for syslog and file backends 2016-03-11 21:14:39 -05:00
Jeff Mitchell
49d525ebf3 Reintroduce the ability to look up obfuscated values in the audit log
with a new endpoint '/sys/audit-hash', which returns the given input
string hashed with the given audit backend's hash function and salt
(currently, always HMAC-SHA256 and a backend-specific salt).

In the process of adding the HTTP handler, this also removes the custom
HTTP handlers for the other audit endpoints, which were simply
forwarding to the logical system backend. This means that the various
audit functions will now redirect correctly from a standby to master.
(Tests all pass.)

Fixes #784
2015-11-18 20:26:03 -05:00
Jeff Mitchell
7d03d63bfe Update audit documentation around what hash is used 2015-11-18 10:42:42 -05:00
Mitchell Hashimoto
8436264a9b website: clarify that secrets are no longer stored in audit logs 2015-04-21 16:23:16 +01:00
Mitchell Hashimoto
7f410be198 website: audit backends 2015-04-19 22:59:39 -07:00