Skip to content

Commit 73efcb8

Browse files
committed
align page with our other log docs
1 parent c5cf41f commit 73efcb8

File tree

1 file changed

+28
-25
lines changed

1 file changed

+28
-25
lines changed

src/content/docs/cloudflare-one/insights/logs/audit-logs.mdx

Lines changed: 28 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Cloudflare Access generates two types of audit logs:
1515
- **[Authentication audit logs](#authentication-audit-logs)** maintain a record of authentication events.
1616
- **[Per-request audit logs](#per-request-audit-logs)** record requests to protected URI paths and infrastructure targets.
1717

18-
## Authentication audit logs
18+
## Authentication logs
1919

2020
Cloudflare Access logs an authentication event whenever a user or service attempts to log in to an application, whether the attempt succeeds or not.
2121

@@ -24,13 +24,13 @@ Cloudflare Access logs an authentication event whenever a user or service attemp
2424
[Non-identity authentication](#non-identity-authentication) refers to login attempts that matched a non-identity policy such as IP address, device posture, country, valid certificate, or service token.
2525

2626
:::note
27-
28-
Authentication audit logs do not capture actions the user takes once they have authenticated.
29-
27+
Authentication logs do not capture the user's actions during a self-hosted or SaaS application session.
3028
:::
3129

3230
### Identity-based authentication
3331

32+
#### View Access authentication logs
33+
3434
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
3535

3636
To view logs for identity-based authentication events:
@@ -76,37 +76,40 @@ curl "https://api.cloudflare.com/client/v4/accounts/{account_id}/access/logs/acc
7676

7777
Identity-based authentication logs contain the following fields:
7878

79+
##### Basic information
80+
7981
| Field | Description |
8082
| -------------- | --------------------------------------------------------- |
81-
| **user_email** | The email address of the authenticating user. |
82-
| **ip_address** | The IP address of the authenticating user. |
83-
| **app_uid** | The unique identifier for the protected application. |
84-
| **app_domain** | The URL of the protected application. |
85-
| **action** | The event that occurred, such as a login attempt. |
86-
| **allowed** | The result of the authentication event. |
87-
| **created_at** | The event timestamp. |
88-
| **connection** | The IdP used to authenticate. |
89-
| **country** | The country associated with the user's IP address. |
90-
| **ray_id** | A unique identifier for every request through Cloudflare. |
91-
| **app_type** | The type specifies if the app is self-hosted, SaaS, or infrastructure. |
92-
93-
The following fields may be provided in the case of infrastructure access:
83+
| **App** | Name of the Access application. |
84+
| **User email** | Email address of the authenticating user. |
85+
| **User ID** | UUID of the authenticating user. |
86+
| **IP address** | IP address of the authenticating user. |
87+
| **App UID** | UUID of the Access application. |
88+
| **App domain** | URL of the Access application. |
89+
| **App type** | The type specifies if the Access application is self-hosted, SaaS, or infrastructure. |
90+
| **Event** | Type of authentication event, such as a login attempt. |
91+
| **Connection** | IdP used to authenticate. |
92+
| **Allow** | Result of the authentication event. |
93+
| **Request time** | Timestamp of the authentication event. |
94+
| **Ray ID** | A unique identifier for every request through Cloudflare. |
95+
| **Country** | Country associated with the user's IP address. |
96+
97+
##### Infrastructure applications
98+
99+
Cloudflare Access logs the following information when the user authenticates to an infrastructure application:
94100

95101
| Field | Description |
96102
| -------------- | --------------------------------------------------------- |
97-
| **hostname** | The hostname of the infrastructure target. |
98-
| **target_id** | The unique identifier of the infrastructure target. |
99-
| **ssh_user** | The UNIX user, such as `root`, that the authenticating user specified when connecting to the infrastructure target. |
103+
| **Hostname** | Hostname of the infrastructure target. |
104+
| **Target ID** | UUID of the infrastructure target. |
105+
| **SSH user** | The UNIX user, such as `root`, that the authenticating user specified when connecting to the infrastructure target. |
106+
| **SSH logs** | SSH commands that the user ran on the target. Requires configuring an [SSH encryption key](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#ssh-command-logs) before the session begins. |
100107

101108
### Non-identity authentication
102109

103110
To retrieve logs for non-identity authentication events, use the [GraphQL Analytics API](/analytics/graphql-api/tutorials/querying-access-login-events/). These logs are not available in Zero Trust.
104111

105-
### Log retention
106-
107-
Refer to [Cloudflare Zero Trust log retention](https://developers.cloudflare.com/cloudflare-one/insights/logs/#log-retention) to view Access log retention policies.
108-
109-
## Per-request audit Logs
112+
## Per-request logs
110113

111114
Users who have authenticated through Access have access to authorized URL paths for the duration of their session. Cloudflare provides several ways to audit these requests.
112115

0 commit comments

Comments
 (0)