Audit Logging

Track all security-relevant actions in Authority.

Overview

Authority logs all significant events to help with:

  • Security monitoring

  • Compliance requirements

  • Incident investigation

  • User activity tracking

Logged Events

Event
Description

user.login

Successful login

user.login_failed

Failed login attempt

user.logout

User logout

user.created

New user registration

user.updated

Profile update

user.deleted

User deletion

user.locked

Account locked

user.unlocked

Account unlocked

mfa.enabled

MFA enabled

mfa.disabled

MFA disabled

password.changed

Password change

password.reset

Password reset request

token.issued

Token issued

token.revoked

Token revocation

client.created

OAuth client created

client.updated

OAuth client updated

client.deleted

OAuth client deleted

scope.created

Scope created

scope.updated

Scope updated

authorization.granted

User granted authorization

authorization.denied

User denied authorization

Log Entry Format

Each log entry includes:

Field
Description

id

Unique log entry ID

timestamp

When the event occurred

event

Event type

actor_id

User or client who performed action

actor_type

user, client, or system

resource_type

Type of resource affected

resource_id

ID of affected resource

ip_address

Client IP address

user_agent

Browser/client information

metadata

Additional event-specific data

Example entry:

Viewing Logs

Admin Dashboard

  1. Navigate to Admin DashboardAudit Logs

  2. Use filters to find specific events

Audit Logs

Filter Options

  • Date range - Start and end dates

  • Event type - Filter by specific event

  • User - Filter by actor

  • Resource - Filter by affected resource

  • IP address - Filter by source IP

Export

Export logs in various formats:

  • CSV - For spreadsheet analysis

  • JSON - For processing with scripts

  • PDF - For reports

API Access

List Logs

Response:

Filter Logs

Get Single Entry

Log Retention

Configuration

Manual Cleanup

External Log Shipping

Syslog

File Output

SIEM Integration

Export logs to security information systems:

Monitoring and Alerting

Failed Login Alerts

Suspicious Activity

Monitor for:

  • Multiple failed logins from same IP

  • Admin account logins from new IPs

  • MFA disabled events

  • Client secret rotations

Compliance

GDPR

Audit logs help demonstrate:

  • Who accessed user data

  • What changes were made

  • When access occurred

SOC 2

Logs provide evidence of:

  • Access controls

  • Monitoring activities

  • Incident response

Best Practices

circle-info
  • Enable log shipping to external systems

  • Retain logs for at least 90 days

  • Set up alerts for critical events

  • Regularly review logs for anomalies

circle-exclamation

Next Steps

Last updated

Was this helpful?