All Products
Search
Document Center

Identity as a Service:Log audit

Last Updated:Mar 31, 2026

Every action in your identity system—user logons, permission changes, configuration modifications—can affect service availability, security posture, and compliance standing. Log audit in Alibaba Cloud IDaaS Customer Identity and Access Management (CIAM) gives you a complete, traceable record of these events, from the moment they occur through post-incident review.

What you can answer with log audit

Log audit records key operations from both user and administrator perspectives. Use it to answer questions like:

Users:

  • Who logged on or logged off, and when?

  • Which users had permission changes applied to their accounts?

Administrators:

  • What configuration modifications were made, and by whom?

  • Which operation events occurred in a given time range?

Security and compliance:

  • Is there a full audit trail for a specific user or operation type?

  • Which events should be reviewed for a security audit?

Core features

FeatureDescription
Comprehensive recordingCaptures all key operations: user logon, log off, permission changes, and configuration modifications. No operation falls outside the audit trail.
Source trackingTrace any event across multiple dimensions—time, user, and operation type—to locate the root cause of an issue or confirm that a change was made as expected.
Security auditMeets industry security standards and compliance requirements, providing the evidence base needed to pass security audits and compliance checks.

Use cases

Security monitoring

Real-time monitoring of your identity system for abnormal activities. When something looks wrong, the audit trail lets you detect and respond to potential security threats quickly.

Compliance checks

Produce log evidence to support enterprise compliance reviews. All critical operation events are traceable, helping you meet regulatory and standards requirements.

Troubleshooting

When a service failure or anomaly occurs, use log audit to identify the root cause and accelerate fault recovery.