• Airlock Secure Access Hub
  • About this document
  • About Airlock IAM
  • IAM 8.4 release notes
  • Security best practices
  • Installation and upgrade
  • Operation
  • Initial configuration
  • Configuration management
  • Authentication
    • Interaction models
    • Authentication methods
    • Remember-Me
    • Step-Up authentication
    • Risk-based authentication
    • Failed logins and temp locking
    • Username transformation
    • Maintenance messages
    • User representation
      • Terms and definitions
      • Use cases
      • System design
        • Representer authorization
        • Representee authentication
        • Identity propagation
        • Auditing
      • Flow diagrams
    • Events and notifications
    • Login from new device
    • Actions on log out
  • Self-services
  • Target applications
  • OAuth and OIDC
  • SAML
  • API access control
  • Flows (Airlock IAM concept)
  • Loginapp Configuration
  • Adminapp Configuration
  • Service Container Configuration
  • Transaction Approval Configuration
  • IAM REST APIs
  • Customizing UIs and texts
  • Third-party licenses
  1. Authentication
  2. User representation
  3. System design
  4. Auditing

Auditing in user representation

Events about the representation feature are logged in two log streams:

  • Login Application - Logs technical information in an audit log. 
  • User Activity - Logs user activities.

The following events create a log entry:

  • Start of a user representation
  • Manual stop of a user representation
  • Stop of a user representation by representer logout