Latest update: 7.1.4
- Overview
- Command Line Tools
- Authentication Configuration
- Deployment Configuration
- Global Services Configuration
- Audit Logging
- Base URL Source
- Common Federation Configuration
- Configuration Version Service
- CORS Service
- Dashboard
- Device ID Service
- Device Profiles Service
- Email Service
- External Data Stores
- ForgeRock Authenticator (OATH) Service
- ForgeRock Authenticator (Push) Service
- Globalization Settings
- Google Cloud Platform Service Accounts
- IDM Provisioning
- IoT Service
- Legacy User Self Service
- Logging
- Monitoring
- Multi-Federation Protocol
- Naming
- OAuth2 Provider
- Platform
- Policy Configuration
- Push Notification Service
- RADIUS Server
- REST APIs
- Remote Consent Service
- SAML v2.0 SOAP Binding
- SAML v2.0 Service Configuration
- Scripting
- Session
- Session Property Whitelist Service
- Social Authentication Implementations
- Social Identity Provider Service
- Transaction Authentication Service
- UMA Provider
- User
- User Self-Service
- Self Service Trees
- Validation Service
- WebAuthn Profile Encryption Service
- Ports Used
- Supported Standards
- Service Endpoints
- Log Files and Messages
- Glossary
amverifyarchive
Check AM log archives for tampering.
amverifyarchive
{options}
Description
This command checks log archive integrity.
Options
The following options are required.
-l logName
Verify log files of the specified type. To specify an individual log rather than a type, provide the entire log file name.
-p path
Path to log files to verify.
-u userName
User who can read log files.
-w password
Password of the user who can read log files.
Examples
The following example checks the amConsole
logs.
$ amverifyarchive \
-l amConsole \
-p /path/to/openam/var/audit/ \
-u amadmin \
-w password