Access Panel automatically logs every action related to access requests. This includes each time a user submits an access request, every approval or rejection, and any provisioning activity triggered by the request. These logs are securely stored and timestamped, forming a reliable audit trail that supports compliance, security, and operational oversight requirements.
Audit logs capture key metadata, including:
-
Who submitted a request
-
What resource was requested
-
The outcome (approved, rejected, or provisioned)
-
Timestamp of each action
-
Any justification or attestation data provided during the approval process
Searchable History for Investigations and Reporting
All access-related activity is stored in the Identity Panel’s Operations History, which is accessible through the built-in dashboard and reporting tools. This allows administrators and auditors to:
-
Search and filter logs by user, resource, or outcome
-
Drill down into the details of individual access events
-
Export data for use in compliance reports or audits
-
Monitor provisioning success and detect anomalies
Access Panel also supports attestation campaigns and policy-based access control, and the outcomes of those processes are also logged. This makes it easy to demonstrate access governance during audits and reviews.
Comments
0 comments
Article is closed for comments.