
Source types for the Splunk Add-on for RSA SecurID CAS
The Splunk Add-on for RSA SecurID CAS provides the index-time and search-time knowledge for the runtime user logs, admin audit logs, and high risk user list in the following formats.
Source type | Source | Description | CIM data models |
---|---|---|---|
rsa:securid:cas:usereventlog:json
|
cloud_administration_api://<input_name>:<account_name>
|
Contains user activity events. | Change,Authentication |
rsa:securid:cas:adminlog:json
|
cloud_administration_api://<input_name>:<account_name>
|
Contains admin activity events. | Change,Authentication |
rsa:securid:cas:riskuser:json
|
cloud_administration_api://<input_name>:<account_name>
|
Contains high risk user list events. | NA |
PREVIOUS Lookups for the Splunk Add-on for RSA SecurID CAS |
NEXT Release notes for the Splunk Add-on for RSA SecurID CAS |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!