Skip to main content

Audit Events

The Audit Events page provides administrators with comprehensive visibility into all security-relevant actions and system events across GrantFlow. This immutable audit trail supports compliance requirements, security monitoring, and operational troubleshooting.

Audit Events

Overview

The Audit Events interface captures every significant action within GrantFlow, creating a tamper-proof record of who did what, when, and from where. This comprehensive logging helps you maintain compliance, investigate incidents, support access reviews, and demonstrate due diligence to auditors and stakeholders.

Admin Access Required

The Audit Events page is accessible only to users with administrative privileges. All audit queries are processed server-side with mandatory tenant filtering to ensure data isolation in multi-tenant deployments.

Audit Table

The main table presents a chronological view of all recorded events with the context needed to understand each action and its impact.

Event Information

Each row displays the event timestamp with date and time precision, the actor (user or system process) who initiated the action, the specific action performed (such as "Role Activated," "User Created," or "Approval Granted"), and the target resource affected by the action. Event severity is indicated by color-coded badges: neutral for routine operations, blue for informational events, amber for warnings, and red for critical security events.

Context Details

Additional context helps you understand the full picture. The source IP address shows where the action originated, useful for detecting anomalous access patterns or investigating potential security incidents. The user agent string reveals which client application or browser was used. A unique correlation ID ties related events together, allowing you to trace complex workflows like a role activation that triggered provisioning steps across multiple systems.

Event Outcome

Events clearly indicate whether the action succeeded or failed. Failed events include error messages or reasons, helping you identify configuration issues, permission problems, or potential security concerns quickly.

Search and Filtering

All filtering in the Audit Events page is performed server-side for security and performance. This ensures that large audit datasets are efficiently queried without loading excessive data to the browser, and that all filters respect tenant boundaries.

Use the search bar to find events by actor name, action type, resource, IP address, or any other field in the audit record. Results update dynamically to help you locate relevant events immediately.

Date Range Filtering

Focus on specific time windows using the date range picker. You can select preset ranges like "Last 24 Hours," "Last 7 Days," or "Last 30 Days," or define custom start and end dates for precise investigations. This is particularly useful for compliance reports, incident response, and scheduled access reviews.

Event Type Filter

Filter by event category to narrow the view to specific kinds of activity. See the Event Types Reference section below for a complete list of all auditable actions.

Actor Filter

Show events from a specific user, service account, or system process. This is particularly valuable during user access reviews or when investigating suspicious behavior attributed to a particular identity.

API Query Parameters

For programmatic access and advanced filtering, the audit events API supports these query parameters:

ParameterTypeDescription
startDateISO 8601Filter events after this timestamp
endDateISO 8601Filter events before this timestamp
actorStringFilter by actor user ID or name
actionStringFilter by action type (e.g., account.checkout)
resourceTypeStringFilter by resource type (e.g., Account, Role)
statusStringFilter by outcome (Success, Failed, Denied)
limitNumberMaximum results per page (default 50, max 1000)
offsetNumberPagination offset

Event Details

Click any event row to open the detailed view with complete information.

Full Event Record

The detail panel shows every captured field including the complete request payload, response data, before and after states for changes, full stack traces for errors, and all metadata associated with the event.

The correlation ID links to other events in the same logical transaction. For example, a single role activation might generate events for the request submission, approval decision, provisioning steps in Entra ID, group membership changes in Active Directory, and the final activation confirmation. Related events appear as a timeline so you can understand the full sequence.

Event Context

Contextual information includes the tenant scope, the session ID, authentication method used, and whether the action was performed interactively by a user or automatically by the system.

Export and Reporting

Export Options

Audit data can be exported to CSV or JSON format for analysis in external tools, compliance reporting, or long-term archival. Exports respect the current search and filter settings, allowing you to extract precisely the data you need.

Compliance Reports

GrantFlow supports automated compliance reporting for common frameworks. You can generate reports showing all privileged access within a time period, all changes to critical roles, all approval decisions, or all failed authentication attempts. Reports are formatted for submission to auditors and include all required fields.

Retention and Archival

Retention Policy

Audit events are retained according to your organization's compliance requirements. Most deployments retain detailed logs for 90 days online with immediate access, with older events archived for long-term storage. Your retention settings can be customized based on regulatory needs.

Data Integrity

The audit trail uses cryptographic techniques to ensure records cannot be modified or deleted after creation. Each event is digitally signed, and any attempt to tamper with historical logs is detectable. This immutability is critical for forensic investigations and regulatory compliance.

Common Use Cases

Security Monitoring

Monitor for suspicious patterns such as repeated failed login attempts from unusual locations, privilege escalations outside business hours, or access to sensitive roles by unexpected users. The audit trail provides the evidence needed to detect and respond to security incidents.

Compliance Audits

Demonstrate to auditors that privileged access is properly controlled and monitored. Show who accessed what, when approvals were required and granted, and that the principle of least privilege is enforced through time-limited activations.

Access Reviews

Support periodic access reviews by showing which roles each user activated, how frequently activations occurred, and whether the access pattern aligns with job responsibilities. Export reports for review committees and document review decisions.

Troubleshooting

When users report access problems or provisioning issues, the audit trail provides step-by-step visibility into what happened. Trace failed activations, identify where provisioning steps failed, and determine whether the issue was a configuration problem, a transient network error, or a permission issue in the target system.

Change Management

Track all configuration changes made by administrators, including who created new roles, modified approval policies, added or removed user assignments, or changed connector settings. This audit trail supports change management processes and helps maintain configuration integrity.

Pagination

For large audit datasets, pagination controls help you navigate efficiently. The page shows the current range of events displayed and the total count, with previous and next buttons to move through results. By default, 50 events are shown per page, but you can adjust this to view more or fewer records at once.

Real-Time Updates

The Audit Events view updates in near real-time as new events are captured.

Event Latency

Most events appear within seconds of the action occurring. High-frequency events may be batched for performance, but critical security events are always logged immediately.

Refresh

The page automatically refreshes periodically, or you can manually refresh to see the latest events instantly.

Event Types Reference

GrantFlow captures a comprehensive set of audit events across all system operations. Each event includes the action performed, the resource affected, the actor who initiated the action, and the outcome.

Account Events

ActionDescription
account.createNew privileged account created
account.updateAccount details modified
account.deleteAccount removed from GrantFlow
account.checkoutUser checked out an account
account.checkinUser checked in an account
account.enableAccount enabled for use
account.disableAccount disabled
account.admin_end_checkoutAdministrator forcibly ended a checkout
account.preview_provisioningProvisioning preview generated
ActionDescription
account_link.createAccount assigned to a user
account_link.deleteAccount assignment removed

Role Events

ActionDescription
role.createNew role created
role.updateRole configuration modified
role.deleteRole removed
role.assignRole assigned to user
role.unassignRole assignment removed

Role Assignment Events

ActionDescription
role_assignment.createRole assignment created
role_assignment.deleteRole assignment deleted

Activation Events

ActionDescription
activation.requestUser requested role activation
activation.approveActivation request approved
activation.denyActivation request denied
activation.activateRole activated for user
activation.expireActivation expired automatically
activation.cancelActivation cancelled
activation.extendActivation duration extended

Activation Request Events

ActionDescription
activation_request.createNew activation request submitted
activation_request.cancelActivation request cancelled by user
activation_request.expireActivation request expired without approval

Eligibility Events

ActionDescription
eligibility.createUser eligibility for role created
eligibility.updateEligibility settings modified
eligibility.deleteEligibility removed

Approver Policy Events

ActionDescription
approver_policy.createNew approval policy created
approver_policy.updateApproval policy modified
approver_policy.deleteApproval policy removed
approver_policy.assignPolicy assigned to role
approver_policy.validatePolicy validation performed

Account Policy Events

ActionDescription
account_policy.createNew account policy created
account_policy.updateAccount policy modified
account_policy.deleteAccount policy removed
account_policy.assignPolicy assigned to account

Password Events

ActionDescription
password.revealUser revealed account password
password.rotatePassword rotated
password.rotationPassword rotation completed
password_rotation.triggerManual password rotation triggered
password_rotation.scheduledScheduled rotation executed
password_rotation.cancelPassword rotation cancelled

Connector Events

ActionDescription
connector.createNew connector created
connector.updateConnector configuration modified
connector.deleteConnector removed
connector.validateConnector validation performed
connector.syncDirectory sync initiated
connector.upsertConnector created or updated
connector.testConnector test executed

Role Provisioning Events

ActionDescription
role_provisioning.createProvisioning rule created
role_provisioning.updateProvisioning rule modified
role_provisioning.deleteProvisioning rule removed
role_provisioning.previewProvisioning preview generated
provisioning.createProvisioning action executed
provisioning.deleteProvisioning removed
provisioning.previewProvisioning preview

Agent Events

ActionDescription
agent.createNew agent registered
agent.updateAgent configuration modified
agent.deleteAgent removed
agent.revokeAgent certificate revoked
agent.update_connectorAgent connector assignment changed
agent.update_capabilitiesAgent capabilities modified
agent.regenerate_enrollment_codeNew enrollment token generated

Job Events

ActionDescription
job.createBackground job created
job.completeJob completed successfully
job.failJob failed
job.cancelJob cancelled
job.callbackJob callback received
job.submit_ad_syncAD sync job submitted
job.submit_ad_testAD connection test submitted
job.submit_entra_syncEntra ID sync job submitted
job.submit_entra_testEntra ID connection test submitted

Callback Events

ActionDescription
callback.account_checkoutCheckout callback processed
callback.sync_resultSync result callback received
callback.password_rotationPassword rotation callback processed

Authentication Events

ActionDescription
auth.loginUser logged in
auth.logoutUser logged out
auth.mfaMFA challenge completed

User Events

ActionDescription
user.createNew user created
user.updateUser profile modified
user.deleteUser removed

Rate Limiting Events

ActionDescription
rate_limit.exceededRate limit exceeded for user
rate_limit.ip_exceededIP-based rate limit exceeded

Administrative Events

ActionDescription
admin.access_deniedAdministrative access denied
audit_log.listAudit log listing accessed
audit_log.viewAudit log entry viewed

Resource Types

Each event is associated with a resource type for easier filtering:

Resource TypeDescription
AccountPrivileged account
AccountLinkAccount-to-user assignment
AccountCheckoutActive checkout session
RoleGrantFlow role
RoleAssignmentRole-to-user assignment
ActivationActive role activation
ActivationRequestPending activation request
EligibilityUser eligibility for role
ApproverPolicyApproval workflow policy
AccountPolicyAccount checkout policy
ConnectorIdentity connector
UserGrantFlow user
SessionUser session
PasswordAccount password
PasswordRotationPassword rotation job
RoleProvisioningProvisioning configuration
JobBackground job
AgentOn-premises agent
ControlPlaneJobControl plane job
APIAPI operation
AuditLogAudit log access

Event Status

Every audit event includes an outcome status:

StatusDescription
SuccessOperation completed successfully
FailedOperation failed (check details for reason)
DeniedOperation denied due to authorization
PendingOperation is pending completion
ThrottledOperation rejected due to rate limiting

Best Practices

Regular Monitoring

Establish a routine for reviewing audit events, particularly focusing on critical security actions, failed operations, and out-of-hours activity. Proactive monitoring helps detect issues before they escalate.

Alert Configuration

Consider configuring alerts for high-severity events or unusual patterns. While alert configuration happens outside the Audit Events page, the events captured here form the foundation for automated security monitoring.

Documentation

When investigating incidents or conducting access reviews, document your findings by exporting relevant audit records and including them in your reports. The correlation IDs and detailed context make it easy to reconstruct exactly what happened.

Training

Ensure your security and compliance teams understand how to read and interpret audit events. Regular training on common event types, severity levels, and investigation techniques ensures your team can respond effectively to security concerns.