Ability to audit (track) TWS commands run via composer or conman
How do you use the the command line client to configure WebSphere to audit Tivoli Workload Scheduler (TWS) commands run by a user?
This document is not intended to instruct a user how to configure auditing for TWS as a whole, but rather, how to audit commands run via the command line client when using composer or conman.
In the event you need to configure access to WebSphere for users from the command line, these are points to keep in mind.
- User credentials are found in the file:
USEROPTS = useropts_m86
$ ls -l $HOME/.TWS
-rw-rw-r-- 1 m86 m86 52 Apr 25 08:20 useropts_m86
PASSWORD = "ENCRYPT:<encrypted password>"
$ composer -username m86 li ws=@
$ conman "-username m86 sbf /tmp/file1;alias=file1j1"
This makes auditing possible.