Toggle navigationAirlock Secure Access HubAbout this documentAbout Airlock IAMIAM 8.5 release notesSecurity best practicesInstallation and upgradeOperationIAM Command-Line Interface CLIStarting and stopping IAMCreating servicesCustomizing servicessystemd services with profilesSandboxing with profilesUsing profilesLicense and usage analyticsGenerating log outputsLog parameters, appenders, and filesLog rotationProcessing log outputLogging APIElasticsearch / Kibana reportingIntegration with container envionmentsCustom log agent / data collectorUsing FluentdUser trail loggingUser trail clean-upCorrelation IDLog message formatsMain log formatStructured log formatShared attributesReporting attributesaction_group / actionfactor / factor_detailLoglevel FATALMonitoring, health checks, metricsUsing systemdLR(S) probesEndpoints, responses, and securityConfiguration of health checks endpointsHealth check endpoint usageMetricsJMXPerformance tuningData backup and restoreExternalize session state in RedisReasons for connection dropsInitial configurationConfiguration managementAuthenticationSelf-servicesTarget applicationsOAuth and OIDCSAMLAPI access controlFlows (Airlock IAM concept)Loginapp ConfigurationAdminapp ConfigurationService Container ConfigurationTransaction Approval ConfigurationIAM REST APIsCustomizing UIs and textsThird-party licensesOperationOperationChapter contentIAM Command-Line Interface CLIStarting and stopping IAMSandboxing with profilesLicense and usage analyticsGenerating log outputsProcessing log outputUser trail loggingCorrelation IDLog message formatsMonitoring, health checks, and metricsPerformance tuning and scaling best practicesData backup and restoreStoring session state in an external Redis session repositoryConnection drop with slash and/or backslash in the username
Chapter contentIAM Command-Line Interface CLIStarting and stopping IAMSandboxing with profilesLicense and usage analyticsGenerating log outputsProcessing log outputUser trail loggingCorrelation IDLog message formatsMonitoring, health checks, and metricsPerformance tuning and scaling best practicesData backup and restoreStoring session state in an external Redis session repositoryConnection drop with slash and/or backslash in the username