Toggle navigationAirlock Secure Access HubAbout this documentAbout Airlock IAMIAM 8.4 release notesSecurity best practicesInstallation and upgradeOperationCommand-Line InterfaceStarting / stoppingCreating servicesCustomizing servicessystemd services with profilesSandboxing with profilesUsing profilesLicense and usage analyticsGenerating log outputsLog parameters, appenders, and filesLog rotationProcessing log outputLogging APIElasticsearch / Kibana reportingIntegration with container envionmentsCustom log agent / data collectorUsing FluentdUser trail loggingUser trail clean-upCorrelation IDLog message formatsMain log formatStructured log formatShared attributesReporting attributesaction_group / actionfactor / factor_detailLoglevel FATALMonitoring, health checks, metricsUsing systemdLR(S) probesEndpoints, responses, and securityConfiguration of health checks endpointsHealth check endpoint usageMetricsJMXPerformance tuningData backup and restoreExternalize session state in RedisReasons for connection dropsInitial configurationConfiguration managementAuthenticationSelf-servicesTarget applicationsOAuth and OIDCSAMLAPI access control Flows (Airlock IAM concept)Loginapp ConfigurationAdminapp ConfigurationService Container ConfigurationTransaction Approval ConfigurationIAM REST APIsCustomizing UIs and textsThird-party licensesOperationOperationChapter contentIAM Command-Line Interface (CLI)Starting and stopping Airlock IAM (system service integration)Sandboxing with profilesLicense and usage analyticsGenerating Airlock IAM log outputProcessing Airlock IAM log outputUser trail loggingCorrelation ID for better traceabilityLog message formatsMonitoring, health checks, and metricsPerformance tuning and scaling best practicesData backup and restoreStoring session state in an external Redis session repositoryConnection drop with slash and/or backslash in the username
Chapter contentIAM Command-Line Interface (CLI)Starting and stopping Airlock IAM (system service integration)Sandboxing with profilesLicense and usage analyticsGenerating Airlock IAM log outputProcessing Airlock IAM log outputUser trail loggingCorrelation ID for better traceabilityLog message formatsMonitoring, health checks, and metricsPerformance tuning and scaling best practicesData backup and restoreStoring session state in an external Redis session repositoryConnection drop with slash and/or backslash in the username