Auditing

ActivID AS maintains a secure, tamper-evident audit log of all authentication, administration, and authorization requests.

The audit log entries contain a complete set of data to enable a compliance-oriented view of system activities, including action, system user, end user, channel, date, time, and outcome.

All permissions that modify the ActivID AS data are written to an audit log. These include:

  • Initial configuration of ActivID AS
  • Data administration activities (for example, modifying access privileges of users such as supervisors)
  • User and authenticator management

In addition, all authentication requests are written to the audit log.

For situations where the action was carried out by a direct user on behalf of an indirect user, the identifiers of both users are recorded.

Audit functions are not specific to a particular authentication class, although the parameters recorded in the audit log will vary by authentication class. For example, an entry for a device authentication request will include the device serial number, whereas an entry for a Security Questions authentication will include the prompt codes.

ActivID AS records all API calls in an audit log which is stored in the ActivID AS database along with the ActivID AS data for configuration.

Note:  Starting with ActivID AS 8.2, the PII data of audit log events is anonymized.

Topics in this section