You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/insights/logs/audit-logs.mdx
+28-25Lines changed: 28 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ Cloudflare Access generates two types of audit logs:
15
15
-**[Authentication audit logs](#authentication-audit-logs)** maintain a record of authentication events.
16
16
-**[Per-request audit logs](#per-request-audit-logs)** record requests to protected URI paths and infrastructure targets.
17
17
18
-
## Authentication audit logs
18
+
## Authentication logs
19
19
20
20
Cloudflare Access logs an authentication event whenever a user or service attempts to log in to an application, whether the attempt succeeds or not.
21
21
@@ -24,13 +24,13 @@ Cloudflare Access logs an authentication event whenever a user or service attemp
24
24
[Non-identity authentication](#non-identity-authentication) refers to login attempts that matched a non-identity policy such as IP address, device posture, country, valid certificate, or service token.
25
25
26
26
:::note
27
-
28
-
Authentication audit logs do not capture actions the user takes once they have authenticated.
29
-
27
+
Authentication logs do not capture the user's actions during a self-hosted or SaaS application session.
|**hostname**| The hostname of the infrastructure target. |
98
-
|**target_id**| The unique identifier of the infrastructure target. |
99
-
|**ssh_user**| The UNIX user, such as `root`, that the authenticating user specified when connecting to the infrastructure target. |
103
+
|**Hostname**| Hostname of the infrastructure target. |
104
+
|**Target ID**| UUID of the infrastructure target. |
105
+
|**SSH user**| The UNIX user, such as `root`, that the authenticating user specified when connecting to the infrastructure target. |
106
+
|**SSH logs**| SSH commands that the user ran on the target. Requires configuring an [SSH encryption key](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#ssh-command-logs) before the session begins. |
100
107
101
108
### Non-identity authentication
102
109
103
110
To retrieve logs for non-identity authentication events, use the [GraphQL Analytics API](/analytics/graphql-api/tutorials/querying-access-login-events/). These logs are not available in Zero Trust.
104
111
105
-
### Log retention
106
-
107
-
Refer to [Cloudflare Zero Trust log retention](https://developers.cloudflare.com/cloudflare-one/insights/logs/#log-retention) to view Access log retention policies.
108
-
109
-
## Per-request audit Logs
112
+
## Per-request logs
110
113
111
114
Users who have authenticated through Access have access to authorized URL paths for the duration of their session. Cloudflare provides several ways to audit these requests.
0 commit comments