Resource statistics data: Security

Learn about the data that is returned for the Security resource type when you activate resource statistics collection.

You can view these statistics in the web user interface, or you can write a program that subscribes to a publication (single XML message) that returns this data. For an example of the publication message, see Example XML output.

When a message flow is configured with a security profile, requests are typically made to a security provider or Security Token Service (STS) to process and approve authentication, mapping, or authorization. Use the security resource statistics to review the number of requests that are made, how many of those requests are successful, and how many are being serviced from the security cache.

A statistics summary is returned for the whole integration server, followed by a breakdown for each named security provider. Examples of named security providers are WS-Trust v1.3 STS and LDAP.

The following table describes the measurements that are returned for each provider.
Measurements Description
TotalOperations The number of security operations (authentication, mapping, or authorization) since collection started. A security profile with both authentication and authorization counts as two operations.
TotalSuccessfulOperations The number of security operations (authentication, mapping, or authorization) that were approved.
TotalOperationsServicedByCache The number of security operations (authentication, mapping, or authorization) that were serviced from the security cache (without accessing the STS directly).
TotalCacheEntries The total number of security operation result entries in the security cache. A security operation is defined in the security profile as authentication, mapping, or authorization. A cache entry might include a returned security token.