Object accesses

It is necessary to audit object access to monitor users who access a given object (for example, the shadow password file).