Administration Log Messages for Cloud Access Service (80001 - 81402)
Administration Log Messages for Cloud Access Service (80001 - 81402)
The Cloud Administration Console generates audit log messages that describe Super Admin activities.
Note: Use the Log Events API to write a client program that retrieves and delivers these messages. For more information, see Manage Legacy Clients (API Keys).
| Activity Key | Activity Code | Message |
|---|---|---|
| SIGNIN_SUCCESS | 80001 | Admin {0} successfully signed in |
| SIGNIN_FAILURE | 80002 | Admin {0} sign-in failed |
| LOCKED_ADMIN_ACCOUNT | 80003 | System locked admin {0} account |
| UNLOCKED_ADMIN_ACCOUNT | 80004 | System unlocked admin {0} account |
| REQUESTED_PASSWORD_RESET | 80005 | Admin {0} requested password reset |
| RESET_PASSWORD | 80006 | Admin {0} reset password |
| SIGNOUT | 80007 | Admin {0} signed out |
| SIGNIN_ADDITIONAL_AUTHENTICATION_REQUESTED | 80008 | Admin {0} successfully sent additional authentication request |
| PUBLISH | 80100 | Admin {0} published to identity routers, result: {1}, and published to Cloud Authentication Service, result: {2} |
| ADD_POLICY | 80200 | Admin {0} added access policy {1} |
| EDIT_POLICY | 80201 | Admin {0} edited access policy {1} |
| DELETE_POLICY | 80202 | Admin {0} deleted access policy {1} |
| LICENSE_EDIT_POLICY | 80203 | Admin {0} edited license options and, as a result access policies were edited |
| ADD_IDR | 80300 | Admin {0} added identity router {1} |
| EDIT_IDR | 80301 | Admin {0} edited identity router {1} |
| DELETE_IDR | 80302 | Admin {0} deleted identity router {1} |
| TEST_IDR | 80303 | Admin {0} tested identity router {1} |
| REBOOT_IDR | 80304 | Admin {0} rebooted identity router {1} |
| RESTART_IDR | 80305 | Admin {0} restarted identity router {1} |
| APPLY_IDR_LOG_LEVEL | 80306 | Admin {0} set the identity router {1} log level |
| VIEW_IDR_LOG | 80307 | Admin {0} viewed the identity router {1} log |
| RESET_IDR_PASSWORD | 80308 | Admin {0} reset the identity router {1} password |
| UPDATE_IDR | 80309 | Admin {0} updated identity router {1} software |
| DOWNLOAD_IDR_LOG | 80310 | Admin {0} downloaded the identity router {1} log |
| DOWNLOAD_IDR_IMAGE | 80311 | Admin {0} downloaded identity router image |
| ADD_CLUSTER | 80320 | Admin {0} added cluster {1} |
| EDIT_CLUSTER | 80321 | Admin {0} edited cluster {1} |
| DELETE_CLUSTER | 80322 | Admin {0} deleted cluster {1} |
| UPDATE_CLUSTER | 80323 | Admin {0} updated identity router software for cluster {1} |
| EDIT_CLUSTER_RELATIONSHIPS | 80324 | Admin {0} edited cluster relationships |
| ADD_CLUSTER_UPDATE_SCHEDULE | 80325 | Admin {0} added a scheduled date for updating identity routers software version in cluster {1} to {2} |
| EDIT_CLUSTER_UPDATE_SCHEDULE | 80326 | Admin {0} edited the scheduled date for updating identity routers software version in cluster {1} to {2} |
| ADD_CLUSTER_BACKUP | 80330 | Admin {0} added backup configuration for the cluster {1} |
| EDIT_CLUSTER_BACKUP | 80331 | Admin {0} edited backup configuration for the cluster {1} |
| DELETE_CLUSTER_BACKUP | 80332 | Admin {0} deleted backup configuration for the cluster {1} |
| EDIT_BACKUP_SCHEDULE | 80333 | Admin {0} updated cluster backup schedule |
| BACKUP_NOW | 80334 | Admin {0} created a backup for the cluster {1} |
| RESTORE_BACKUP | 80335 | Admin {0} restored the cluster {1} from backup |
| EDIT_AUDIT_CONFIGURATION | 80340 | Admin {0} edited audit log configuration |
| EDIT_CA_CERTIFICATES | 80350 | Admin {0} edited the list of trusted Certificate Authorities for IDR proxied applications |
| EDIT_ENCRYPTION_SETTINGS | 80351 | Admin {0} edited encryption settings for IDR incoming and outgoing connections |
| ADD_AM_CONFIGURATION | 80360 | Admin {0} added Cloud Authentication Service to Authentication Manager connection |
| EDIT_AM_CONFIGURATION | 80361 | Admin {0} edited Cloud Authentication Service to Authentication Manager connection |
| DELETE_AM_CONFIGURATION | 80362 | Admin {0} deleted Cloud Authentication Service to Authentication Manager connection |
| GENERATE_AM_CODE | 80363 | Admin {0} generated the Authentication Manager registration code |
| REGISTER_AM_CODE | 80364 | Authentication Manager registered with Cloud Authentication Service using generated code |
| GENERATE_AM_CONFIGURATION | 80365 | Admin {0} generated Cloud Authentication Service configuration for Authentication Manager using keys {1} |
| ENABLE_HA_TOKENCODE | 80366 | Admin {0} enabled High Availability OTP for Authentication Manager |
| DISABLE_HA_TOKENCODE | 80367 | Admin {0} disabled High Availability OTP for Authentication Manager |
| CREATED_AM_NOTIFY_CONFIGURATION | 80369 | Admin {0} created notification configuration for Authentication Manager |
| ADD_ADMIN_API_KEY | 80400 | Admin {0} added Admin API Key {1} |
| EDIT_ADMIN_API_KEY | 80410 | Admin {0} edited Admin API Key {1} |
| REGENERATE_ADMIN_API_KEY | 80420 | Admin {0} regenerated Admin API Key {1} |
| DELETE_ADMIN_API_KEY | 80430 | Admin {0} deleted Admin API Key {1} |
| LICENSE_EDIT_ASSURANCE | 80601 | Admin {0} edited license options and, as a result assurance levels were edited |
| EDIT_PORTAL_SETTINGS | 80700 | Admin {0} edited identity router user application portal configuration |
| EDIT_AUTHENTICATION_SOURCES | 80800 | Admin {0} edited authentication sources |
| ADD_TRUSTED_LOCATION | 80900 | Admin {0} added trusted location {1} |
| EDIT_TRUSTED_LOCATION | 80901 | Admin {0} edited trusted location {1} |
| DELETE_TRUSTED_LOCATION | 80902 | Admin {0} deleted trusted location {1} |
| DELETE_ALL_TRUSTED_LOCATIONS | 80903 | Admin {0} deleted all trusted locations |
| ADD_TRUSTED_NETWORK | 81000 | Admin {0} added trusted network {1} |
| EDIT_TRUSTED_NETWORK | 81001 | Admin {0} edited trusted network {1} |
| EDIT_TRUSTED_NETWORK_LIST | 81002 | Admin {0} edited trusted network list |
| DELETE_TRUSTED_NETWORK | 81003 | Admin {0} deleted trusted network {1} |
| DELETE_ALL_TRUSTED_NETWORK | 81004 | Admin {0} deleted all trusted networks |
| ADD_IDENTITY_SOURCE | 81100 | Admin {0} added identity source {1} |
| EDIT_IDENTITY_SOURCE | 81101 | Admin {0} edited identity source {1} |
| DELETE_IDENTITY_SOURCE | 81102 | Admin {0} deleted identity source {1} |
| SYNC_IDENTITY_SOURCE_MANUAL | 81103 | Admin {0} manually initiated synchronization for identity source {1} |
| ADD_IDENTITY_SOURCE_FOR_PCP | 81106 | When admin {0} added identity source {1}; attempt was made to associate Preconfigured Access Policies to this identity source |
| DELETE_IDENTITY_SOURCE_FOR_PCP | 81107 | When admin {0} deleted identity source {1}; attempt was made to dissociate Preconfigured Access Policies to this identity source |
| GENERATE_SCIM_SERVICE_API_KEY | 81108 | Admin {0} generated SCIM Service API Key for identity source {2} |
| VIEW_SCIM_SERVICE_API_KEY | 81109 | Admin {1} viewed SCIM Service API Key for identity source {2} |
| COPY_SCIM_SERVICE_API_KEY | 81110 | Admin {1} copied SCIM Service API Key for identity source {2} |
| HIDE_SCIM_SERVICE_API_KEY | 81111 | Admin {1} hid SCIM Service API Key for identity source {2} after {3} |
| ADD_IDENTITY_SOURCE_REST_API | 81114 | Admin {1} added identity source {2} using REST API |
| DELETE_IDENTITY_SOURCE_REST_API | 81115 | Admin {1} deleted identity source {2} using REST API |
| REGENERATE_SCIM_SERVICE_API_KEY_REST_API | 81116 | Admin {1} regenerated SCIM Service API Key for identity source {2} using REST API |
| UPDATE_IDENTITY_SOURCE_REST_API | 81117 | Admin {1} updated identity source {2} using REST API |
| SYNC_USER | 81200 | Admin {0} synchronized user {1} |
| DELETE_USER_NOW | 81201 | Admin {0} deleted user {1} |
| ENABLE_USER | 81202 | Admin {0} enabled user {1} |
| DISABLE_USER | 81203 | Admin {0} disabled user {1} |
| DELETE_USER_DEVICE | 81204 | Admin {0} deleted device {1} for user {2} |
| DELETE_USER_FIDOTOKEN | 81205 | Admin {0} deleted FIDO authenticator {1} for user {2} |
| UNLOCK_USER_TOKENCODE | 81206 | Admin {0} unlocked authenticator for user {1} |
| EDIT_USER_DETAILS | 81207 | Admin {0} edited user details for user {1} |
| UNDELETE_USER | 81208 | Admin {0} undeleted user {1} |
| UNDELETE_BULK_USERS | 81209 | Admin {0} undeleted {1} users |
| DISABLE_AUTO_DELETE_USERS | 81210 | Admin {0} disabled automatic bulk deletion of disabled users from the Cloud Authentication Service |
| ENABLE_AUTO_DELETE_USERS | 81211 | Admin {0} enabled automatic bulk deletion of disabled users from the Cloud Authentication Service. Users disabled for more than {1} days will be marked for deletion. |
| MARK_USER_FOR_DELETE | 81212 | Admin {0} marked user {1} for deletion |
| ADD_USER_TO_HIGHRISK_LIST | 81213 | Admin {0} added users {1} to high risk list |
| REMOVE_USER_FROM_HIGHRISK_LIST | 81214 | Admin {0} removed users {1} from high risk list |
| GENERATE_DEVICE_REGISTRATION_CODE | 81215 | Admin {0} generated a registration code for user {1} |
| UNLOCK_USER_PASSWORD_LOCKED | 81216 | Admin {0} unlocked user |
| ASSIGN_HARDWARE_TOKEN | 81217 | Admin {0} assigned hardware authenticator with serial number {1} to user {2} |
| DISABLE_HARDWARE_TOKEN | 81218 | Admin {0} disabled hardware authenticator with serial number {1} from user {2} |
| ENABLE_HARDWARE_TOKEN | 81219 | Admin {0} enabled hardware authenticator with serial number {1} to user {2} |
| UPDATE_HARDWARE_TOKEN_NAME | 81220 | Admin {0} updated hardware authenticator with serial number {1} to user {2} |
| UNASSIGN_HARDWARE_TOKEN | 81221 | Admin {0} unassigned hardware authenticator with serial number {1} from user {2} |
| CLEAR_HARDWARE_TOKEN_PIN | 81222 | Admin {0} cleared PIN of hardware authenticator with serial number {1} from user {2} |
| IMPORT_HARDWARE_TOKEN | 81223 | Admin {0} imported hardware authenticator file {1} |
| DELETE_HARDWARE_TOKEN | 81225 | Admin {0} deleted hardware authenticator with serial number {1} |
| DELETE_EXPIRED_HARDWARE_TOKEN | 81226 | Admin {0} deleted expired SecurID hardware authenticators |
| CLEAR_OATHHOTP_TOKEN_PIN | 81230 | Admin {0} cleared PIN of OATH HOTP hardware authenticator with serial number {1} from user {2} |
| UNASSIGN_OATHHOTP_TOKEN | 81231 | Admin {0} unassigned OATH HOTP hardware authenticator with serial number {1} from user {2} |
| DISABLE_OATHHOTP_TOKEN | 81232 | Admin {0} disabled OATH HOTP hardware authenticator with serial number {1} from user {2} |
| ENABLE_OATHHOTP_TOKEN | 81233 | Admin {0} enabled OATH HOTP hardware authenticator with serial number {1} to user {2} |
| DELETE_OATHHOTP_TOKEN | 81234 | Admin {0} deleted OATH HOTP hardware authenticator with serial number {1} |
| ASSIGN_OATHHOTP_TOKEN | 81235 | Admin {0} assigned OATH HOTP hardware authenticator with serial number {1} to user {2} |
| IMPORT_OATHHOTP_TOKEN_SUCCESSFUL | 81236 | Admin {0} imported {1} OATH HOTP hardware authenticator OTP Seed(s) from the file {2} for {3} {4} {5} a display. The OTP length is {6} |
| IMPORT_OATHHOTP_TOKEN_PARTIAL_SUCCESS | 81237 | Admin {0} attempted to import OATH HOTP hardware authenticator OTP Seed(s) from the file {1}. {2} |
| IMPORT_OATHHOTP_TOKEN_FAILED | 81238 | Admin {0} attempted to import OATH HOTP hardware authenticator OTP Seed(s) from the file {1}. {2}, so nothing was imported. |
| DELETE_DS100_TOKEN_OTP_AND_FIDO | 81250 | Admin {0} deleted OTP credential for SecurID DS100 with device serial number {1} for user {2} |
| DELETE_DS100_TOKEN_OTP | 81251 | Admin {0} deleted OTP credential for SecurID DS100 with device serial number {1} for user {2} |
| DELETE_DS100_TOKEN_FIDO | 81252 | Admin {0} deleted SecurID DS100 FIDO credential {1} for user {2} |
| ENABLE_DS100_OTP | 81253 | Admin {0} enabled OTP credential for SecurID DS100 with device serial number {1} for user {2} |
| ENABLE_DS100_FIDO | 81254 | Admin {0} enabled SecurID DS100 FIDO credential {1} for user {2} |
| DISABLE_DS100_OTP | 81255 | Admin {0} disabled OTP credential for SecurID DS100 with device serial number {1} for user {2} |
| DISABLE_DS100_FIDO | 81256 | Admin {0} disabled SecurID DS100 FIDO credential {1} for user {2} |
| DELETE_DS100_TOKEN_OTP_REST_API | 81257 | Admin {0} deleted OTP credential for SecurID DS100 with device serial number {1} |
| EDIT_USER_DETAILS | 81258 | Admin {0} edited user details for user {1} |
| CREATE_USER | 81259 | Admin {0} created user {1} |
| GENERATE_PASSWORD_RESET_CODE_AS_DISPLAY_OTP | 81270 | Admin {0} generated a display otp type password reset code for user {1} |
| GENERATE_PASSWORD_RESET_CODE_AS_EMAIL_OTP | 81271 | Admin {0} generated a email otp type password reset code for user {1}{2} |
| GENERATE_PASSWORD_RESET_CODE_AS_VOICE_OTP | 81272 | Admin {0} generated a voice otp type password reset code for user {1} |
| GENERATE_PASSWORD_RESET_CODE_AS_SMS_OTP | 81273 | Admin {0} generated a sms otp type password reset code for user {1} |
| GENERATE_SECURE_ENROLLMENT_CODE_AS_DISPLAY_OTP | 81274 | Admin {0} generated a display otp type secure enrollment code for user {1} |
| GENERATE_SECURE_ENROLLMENT_CODE_AS_EMAIL_OTP | 81275 | Admin {0} generated a email otp type secure enrollment code for user {1}{2} |
| GENERATE_SECURE_ENROLLMENT_CODE_AS_VOICE_OTP | 81276 | Admin {0} generated a voice otp type secure enrollment code for user {1} |
| GENERATE_SECURE_ENROLLMENT_CODE_AS_SMS_OTP | 81277 | Admin {0} generated a sms otp type secure enrollment code for user {1} |
| GENERATE_PASSWORD_RESET_CODE | 81278 | Admin {0} generated a password reset code |
| GENERATE_SECURE_ENROLLMENT_CODE | 81279 | Admin {0} generated a secure enrollment code |
| VOID_SECURE_ENROLLMENT_CODE | 81280 | Admin {0} voided a secure enrollment code |
| VOID_PASSWORD_RESET_CODE | 81281 | Admin {0} voided a password reset code |
| ENABLE_FIDO_TOKEN | 81290 | Admin {0} enabled FIDO token {1} for user {2} |
| DISABLE_FIDO_TOKEN | 81291 | Admin {0} disabled FIDO token {1} for user {2} |
| ADD_IDENTITY_PROVIDER | 81300 | Admin {0} added identity provider {1} |
| EDIT_IDENTITY_PROVIDER | 81301 | Admin {0} edited identity provider {1} |
| DELETE_IDENTITY_PROVIDER | 81302 | Admin {0} deleted identity provider {1} |
| GENERATE_USER_REPORT | 81400 | Admin {0} generated user report {1} |
| DOWNLOAD_USER_REPORT | 81401 | Admin {0} downloaded user report {1} |
| CANCEL_USER_REPORT | 81402 | Admin {0} canceled user report {1} |
Administration Log Messages for Cloud Access Service (82000 - 82562)
Related Articles
The documentation for enabling the RSA Database Security Manager adapter for SQL Server 2005 discusses the requirement for… 5Number of Views RSA Authentication Manager 8.3 Dell 630 and 230 hardware appliance loses ability to access keyboard when running PING 4.0 … 174Number of Views Change the display pictures of the software token profiles on RSA Authentication Manager 8.x Security and Self-Service con… 47Number of Views In the General Settings associations page clicking reset creates System Internal Error 47Number of Views Zimbra integration with RSA Via Access 4Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process
Don't see what you're looking for?