As multiple activities or changes take place within an application, it’s essential for an organization to keep track of those activities to monitor usage, detect unauthorized activity, and maintain accountability. Josys Audit Logs provides a detailed, chronological record of all significant activities and changes within the application. This helps the organization to respond promptly to security incidents and provides audit capabilities.
The following critical (P1) events are captured in the audit log:
User & Identity Management
- New User Profile Created
- User Profile Deleted
- New identity added
- Identity deleted
- Shadow user mapped to the user profile
- Shadow user converted to the new User profile
- User activated
- User inactivated
- Account locked
- Account archived
- Application & Access Management
- Integrated app provisioned to the user
- Integrated app deprovisioned for the user
- User license modified
- User role modified
- New app integrated
- Integrated app deleted
- Integrated app reintegrated
Security & Authentication
- Permission updated
- Sign-in blocked
- New API Credential created
- New IP whitelist added
- IP whitelist deleted
- IP whitelist updated
- Two-factor Authentication enabled
- Two-factor Authentication disabled
- Single Sign-on enabled
- Single Sign-on disabled
Admin & System Actions
- Super admin added
- Super admin deleted
- IT admin added
- IT admin updated
- IT admin deleted
- Admin Role modified
- Log in to Josys
- Exported file downloaded