📜 Inspect audit logs
Logto's audit log allows you to easily monitor user activity and events. It provides a strong foundation for various user management and health check business scenarios.
View all logs
Logto captures and organizes authentication events into a table. It keeps track of the event name, user, application, and timestamp. You can narrow down the results by filtering based on the event name and application name. Clicking on a specific event will provide additional details.
Capture user activity at the tenant level
Logto's logs offer comprehensive details, ensuring ease of action and customer safety. They capture and record the following information:
- Type of event
- Application involved
- IP address
- User involved
- Log ID
By maintaining these event records, organizations can effectively detect possible security risks and promptly address them to prevent unauthorized system access.
Perform a detailed analysis at the user level
Administrators can perform a detailed analysis of logs associated with specific users, facilitating comprehensive investigations into specific events. The navigation process is straightforward and user-friendly.
To access user-specific logs, follow these steps: Navigate to User Management, select the desired user, and click on User Logs. The resulting table will exclusively display log events performed and triggered by that particular user.