Skip to main content

Access logs

Access logs are the audit trail of system access: successfully initiated sessions (logins) and failed login attempts (fails). Each record is saved with request data for traceability.

What it is used for

  • Reviewing who accessed the system and when
  • Detecting failed access attempts
  • Investigating unauthorized access
  • Supporting compliance requirements regarding access

Recorded information

FieldDescription
UserFor successful logins, the authenticated user. For failed attempts, the attempted username
Date and timeTimestamp of the event
IP addressRemote IP of the request (remote_ip)
User-AgentBrowser or client agent used

Relationship with other modules

  • Records logins and authentication failures for Users
  • Access to log queries is controlled by Roles