Auditing
  • 27 Jun 2025
  • 1 Minute to read
  • Dark
    Light
  • PDF

Auditing

  • Dark
    Light
  • PDF

Article summary

OneSpan Threat View provides the possibility to audit the system via the audit logger Docker image, onespan_threat-view_auditlogger_version.tar. With the auditing system, all Threat View microservices can be audited, allowing you to audit the system for different incoming events such as unauthorized access and troubleshooting issues.

Audit workflow

Threat View checks the microservices and initiates the audit logger. The audit logger initiates the queue, and the audit logger worker adds the audit entries in the audit database. The integrity of the audit information is protected with a cryptographical key that signs the audit entry.

Audited information

Audit records include the following information:

  • Tenant, name of the tenant hosting the audited microservice

  • Time the audit information is collected

  • Name of the audited microservice

  • Endpoint of the audited microservice

  • User ID

  • User domain

  • Result code, indicates if the operation was successful or not.

  • Result message, either Success, or, if the operation was not successful provides an error description.

Retention of audit data

You can configure the retention time for audit data, by default, the data will not be deleted at all.


Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, our interactive help assistant