GenAuth DocsDocuments
Concepts
User Guide
Development Integration
AgentAuth
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Concepts
User Guide
Development Integration
AgentAuth
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Old version
User Guide
  • Quick Start

  • Authentication

  • Access Control

  • Authorization

  • Adaptive MFA

  • User Account Management

  • User Directory Management

  • Applications

  • Become a Federation Authentication Identity Provider

  • Connect External Identity Providers (IdP)

  • WeChat Ecosystem Full Scenario Capabilities

  • Migrate Users to GenAuth

  • Security Settings

  • Branding

  • Automation

  • Audit Logs

  • Setting

  • FAQ

  1. User Guide
  2. /
  3. Audit Logs

¶ Audit Overview

Update time: 2025-07-23 07:34:21
Edit

For information about the GenAuth user pool version that supports the various benefits of the "Audit Log" function, please check the official website "Price" page (opens new window). If your version does not support this benefit and you want to try it, you can activate the trial period. For an introduction to the trial period and how to activate it, please check Trial Period.

Security and compliance are critical to the operation of an enterprise or organization and are the cornerstone of the operation of enterprises and organizations. It is not easy to achieve security and compliance. GenAuth provides operational auditing functions to help enterprises and organizations maintain security and compliance while their business continues to grow.

¶ Log classification

The audit function provided by GenAuth is divided into two aspects:

  • Administrator action operation log: You can get the actions of all administrator users through the identity management platform
  • User action log: You can clearly restore the user's behavior in the platform to support the compliance management of the enterprise, and can also be used for backtracking and determining responsibilities after the incident.

¶ Log content

Whether it is the administrator action log or the user action log, it is mainly composed of the following 5 parts to record what resources the operator operated at what time:

  • Resource: the affected user or resource.
  • Action: what action was taken, whether it is accessing resources or issuing certificates.
  • Related information: the project or server where this action occurred.
  • Operator: the person who implemented the action.
  • Date: the time when the action was taken.
Previous article: Webhooks Next article: User Action Audit
  • Log classification
  • Log content

User identity management

Integrated third-party login
Customized authentication process

Enterprise internal management

Single sign-on
Multi-factor authentication
Permission management

Developer

Development Documentation
GitHub (opens new window)

Company

official@genauth.ai
16th Floor, Building B, Beichen Century Center, Chaoyang District, Beijing (Total)
Room 406, 4th Floor, Block B, No. 200, Tianfu Fifth Street, High-tech Zone, Chengdu (Branch)

© Beijing Steamory Technology Co., Ltd.