Access logs
Access logs are the audit trail of system access: successfully initiated sessions (logins) and failed login attempts (fails). Each record is saved with request data for traceability.
What it is used for
- Reviewing who accessed the system and when
- Detecting failed access attempts
- Investigating unauthorized access
- Supporting compliance requirements regarding access
Recorded information
| Field | Description |
|---|---|
| User | For successful logins, the authenticated user. For failed attempts, the attempted username |
| Date and time | Timestamp of the event |
| IP address | Remote IP of the request (remote_ip) |
| User-Agent | Browser or client agent used |
Relationship with other modules
- Records logins and authentication failures for Users
- Access to log queries is controlled by Roles