2.5
Table Of Contents
- ACE Management Server Administrator’s Manual
- Contents
- About This Book
- Introduction
- Planning an ACE Management Server Deployment
- Installing and Configuring ACE Management Server
- Configuration Options for ACE Management Server
- Prerequisites for Configuring the Server
- Starting ACE Management Server Configuration
- Viewing and Changing Licensing Information
- Using an External Database
- Creating Access Control
- Uploading Custom SSL Certificates
- Logging Events
- Applying Configuration Settings
- Load-Balancing Multiple ACE Management Server Instances
- Typical Setup Using Load-Balanced ACE Management Server Instances
- Install the Required Services for Load Balancing
- Use the Same SSL Certificate on All Servers
- Create New SSL Certificates and Keys for Each Server
- Installing and Configuring the Load Balancer
- Verify That ACE Instances Are Using the Load Balancer
- Managing ACE Instances
- Viewing ACE Instances That the Server Manages
- Search for an Instance
- Sort by Column Heading and Change Column Width
- Show, Hide, and Move Columns in the Instance View
- Create or Delete Custom Columns in the Instance View
- View Instance Details
- Reactivate, Deactivate, or Delete an ACE Instance
- Change a Copy Protection ID
- Reset the Authentication Password
- Add Information for Custom Columns
- Troubleshooting and Maintenance
- Appendix: Database Schema and Audit Event Log Data
- Glossary
- Index
VMware, Inc. 75
Thisappendixexplainstheformatofthedatastoredinthedatabaseandthebestways
toaccessthisdata.Thisappendixincludesthefollowingtopics:
“UsingDatabaseReportingTools”onpage 75
“DatabaseSchema”onpage 76
“QueryingtheAuditEventLogData”onpage 81
Using Database Reporting Tools
Youcanuseathird‐partydatabasemanagementorreportingtoolwiththeVMware
ACEManagementServerdatabase.Youcancreatecustomreportsofthesystemstate
byusingareportingtool.Youcanalsouseareportingtooltoinspecttheaudittrailof
theadministratororuseractionsstored
inthe Eventtable.Forexample,youmightfind
activeinstanceswithoutdatedACEpolicysets,orexcessivefailedauthentication
attempts.
TheRDBMSaccesscontrolmechanismprotectsthedatastoredinthedatabase.Donot
allowthedatabaseuseraccountthatyourreportingtoolusestohaveahigherthan
necessary
levelofaccesstothedata.Otherwiseyoumightcompromisethesecurityof
yourVMwareACEsystem.
Forexample,reportingtoolstypicallydonotneedwriteaccesstothedatabase.Instead,
youcancreateaseparateread‐onlyaccountforthereportingtool.Youmightalsowant
todisallowreadaccess
todatabasefieldsthatcontainsensitiveinformation,suchas
userpasswords,instancecustomizationdata(whichmighthavethedomain
administratorlogin),orinstancediskencryptionkeys.TheembeddedSQLitedatabase
doesnotsupportauthentication,soaccesscanbeprotectedonlybyfile‐basedsecurity
thatprovidesread‐onlypermissionsor
permissionstoperformanyoperation.
Appendix: Database Schema and
Audit Event Log Data