Skip to Content
AdministrationAudit Logs

Audit Logs

Veriproof records every significant administrative and data-access event in an immutable audit log. The log is available to CustomerAdmin and CustomerComplianceOfficer roles (and CustomerAuditor during active audit engagements).

Audit log entries are retained for 90 days for customer-visible records. Staff-side audit logs (platform operator actions on your tenant) are retained for 7 years to meet compliance requirements and are available upon request.

What Is Logged

Authentication & Identity Events

EventDescription
user.loginSuccessful portal sign-in
user.login_failedFailed sign-in attempt (wrong credentials / locked)
user.logoutExplicit sign-out
user.session_expiredSession invalidated due to timeout
user.sso_loginSuccessful SSO authentication
user.invitedNew user invitation sent
user.deactivatedUser account deactivated

Configuration Changes

EventDescription
sso.configuration_createdNew SSO provider configuration saved
sso.configuration_updatedSSO configuration modified
sso.configuration_deletedSSO configuration deleted
sso.configuration_disabledSSO configuration temporarily disabled
webhook.createdWebhook endpoint registered
webhook.updatedWebhook endpoint updated
webhook.deletedWebhook endpoint removed
api_key.issuedNew API key issued
api_key.revokedAPI key revoked
rbac.role_grantedRole assigned to a user
rbac.role_revokedRole removed from a user
notification_channel.createdSlack/Teams channel linked
notification_channel.deletedNotification channel removed

Data Access & Lifecycle Events

EventDescription
evidence_package.generatedEvidence package exported
session_review.approvedSession review decision: approved
session_review.rejectedSession review decision: rejected
gdpr.erasure_requestedData subject erasure request submitted
gdpr.erasure_completedErasure cryptographically completed
gdpr.legal_hold_placedLegal hold applied to a data subject
gdpr.legal_hold_releasedLegal hold released
application.purge_initiatedApplication deletion and purge queued
application.purge_completedApplication purge finished
application.createdNew application registered
application.deletedApplication soft-deleted (purge pending)

Viewing the Audit Log

Navigate to Settings → Audit Logs in the Customer Portal.

Filtering

The audit log viewer supports filtering by:

  • Date range — select start and end timestamps (UTC)
  • Event type — filter to a category (Authentication, Configuration, Data Access)
  • User — show only events performed by a specific user
  • Application — show only events for a specific application

Searching

Use the search box to find events by event type string, user email, or application name. Search is case-insensitive and substring-matched.

Log Entry Structure

Each log entry contains:

FieldDescription
timestampUTC ISO 8601 timestamp of the event
eventTypeMachine-readable event identifier (e.g. rbac.role_granted)
userIdPortal user who performed the action
userEmailEmail of the actor
ipAddressSource IP address
targetIdID of the affected resource (user ID, application ID, etc.)
targetTypeType of the affected resource
detailsFree-text description of the change
outcomesuccess or failure

Immutability

Audit log entries cannot be modified or deleted by tenant users. They are written to append-only storage and are included in the platform’s tamper-evident integrity chain. Attempting to delete audit log records via the API returns 403 Forbidden.

Exporting Audit Logs

To export the full log or a filtered subset:

  1. Apply any filters you need (date range, event type, user).
  2. Click Export as CSV or Export as JSON.
  3. The export runs asynchronously; a download link appears when the file is ready (typically within a few seconds for < 30-day ranges).

Exports are suitable for importing into SIEM tools, compliance file archives, or audit evidence packages.

For fully automated export pipelines, consider configuring an OTel export to stream events to your observability stack in real time.

Including Audit Logs in Evidence Packages

When generating an evidence package, you can include a filtered audit log excerpt. Check the Include audit trail option in the evidence package generator to append the log as a signed attachment.

Retention

Customer audit logs are retained for 90 days from the event timestamp, after which they are automatically deleted by the platform’s retention enforcement worker. If you require longer retention, export logs regularly to your own storage.

Staff audit logs (actions taken by Veriproof platform operators on your tenant, such as impersonation or key rotation) are retained for 7 years and can be produced on request as part of a compliance audit or incident investigation.

Last updated on