Administration Log Messages for Cloud Access Service (80001 - 81402)
a month ago

Administration Log Messages for Cloud Access Service (80001 - 81402)

The Cloud Administration Console generates audit log messages that describe Super Admin activities.

Note:  Use the Log Events API to write a client program that retrieves and delivers these messages. For more information, see Manage Legacy Clients (API Keys).

Activity KeyActivity CodeMessage
SIGNIN_SUCCESS80001Admin {0} successfully signed in
SIGNIN_FAILURE80002Admin {0} sign-in failed
LOCKED_ADMIN_ACCOUNT80003System locked admin {0} account
UNLOCKED_ADMIN_ACCOUNT80004System unlocked admin {0} account
REQUESTED_PASSWORD_RESET80005Admin {0} requested password reset
RESET_PASSWORD80006Admin {0} reset password
SIGNOUT80007Admin {0} signed out
SIGNIN_ADDITIONAL_AUTHENTICATION_REQUESTED80008Admin {0} successfully sent additional authentication request
PUBLISH80100Admin {0} published to identity routers, result: {1}, and published to Cloud Authentication Service, result: {2}
ADD_POLICY80200Admin {0} added access policy {1}
EDIT_POLICY80201Admin {0} edited access policy {1}
DELETE_POLICY80202Admin {0} deleted access policy {1}
LICENSE_EDIT_POLICY80203 Admin {0} edited license options and, as a result access policies were edited
ADD_IDR80300Admin {0} added identity router {1}
EDIT_IDR80301Admin {0} edited identity router {1}
DELETE_IDR80302Admin {0} deleted identity router {1}
TEST_IDR80303Admin {0} tested identity router {1}
REBOOT_IDR80304Admin {0} rebooted identity router {1}
RESTART_IDR80305Admin {0} restarted identity router {1}
APPLY_IDR_LOG_LEVEL80306Admin {0} set the identity router {1} log level
VIEW_IDR_LOG80307Admin {0} viewed the identity router {1} log
RESET_IDR_PASSWORD80308Admin {0} reset the identity router {1} password
UPDATE_IDR80309Admin {0} updated identity router {1} software
DOWNLOAD_IDR_LOG80310Admin {0} downloaded the identity router {1} log
DOWNLOAD_IDR_IMAGE80311Admin {0} downloaded identity router image
ADD_CLUSTER80320Admin {0} added cluster {1}
EDIT_CLUSTER80321Admin {0} edited cluster {1}
DELETE_CLUSTER80322Admin {0} deleted cluster {1}
UPDATE_CLUSTER80323Admin {0} updated identity router software for cluster {1}
EDIT_CLUSTER_RELATIONSHIPS80324Admin {0} edited cluster relationships
ADD_CLUSTER_UPDATE_SCHEDULE80325Admin {0} added a scheduled date for updating identity routers software version in cluster {1} to {2}
EDIT_CLUSTER_UPDATE_SCHEDULE80326Admin {0} edited the scheduled date for updating identity routers software version in cluster {1} to {2}
ADD_CLUSTER_BACKUP80330Admin {0} added backup configuration for the cluster {1}
EDIT_CLUSTER_BACKUP80331Admin {0} edited backup configuration for the cluster {1}
DELETE_CLUSTER_BACKUP80332 Admin {0} deleted backup configuration for the cluster {1}
EDIT_BACKUP_SCHEDULE80333 Admin {0} updated cluster backup schedule
BACKUP_NOW80334Admin {0} created a backup for the cluster {1}
RESTORE_BACKUP80335Admin {0} restored the cluster {1} from backup
EDIT_AUDIT_CONFIGURATION80340Admin {0} edited audit log configuration
EDIT_CA_CERTIFICATES80350Admin {0} edited the list of trusted Certificate Authorities for IDR proxied applications
EDIT_ENCRYPTION_SETTINGS80351Admin {0} edited encryption settings for IDR incoming and outgoing connections
ADD_AM_CONFIGURATION80360Admin {0} added Cloud Authentication Service to Authentication Manager connection
EDIT_AM_CONFIGURATION80361Admin {0} edited Cloud Authentication Service to Authentication Manager connection
DELETE_AM_CONFIGURATION 80362Admin {0} deleted Cloud Authentication Service to Authentication Manager connection
GENERATE_AM_CODE80363Admin {0} generated the Authentication Manager registration code
REGISTER_AM_CODE80364Authentication Manager registered with Cloud Authentication Service using generated code
GENERATE_AM_CONFIGURATION80365Admin {0} generated Cloud Authentication Service configuration for Authentication Manager using keys {1}
ENABLE_HA_TOKENCODE80366Admin {0} enabled High Availability OTP for Authentication Manager
DISABLE_HA_TOKENCODE80367Admin {0} disabled High Availability OTP for Authentication Manager
CREATED_AM_NOTIFY_CONFIGURATION80369Admin {0} created notification configuration for Authentication Manager
ADD_ADMIN_API_KEY80400Admin {0} added Admin API Key {1}
EDIT_ADMIN_API_KEY80410Admin {0} edited Admin API Key {1}
REGENERATE_ADMIN_API_KEY80420Admin {0} regenerated Admin API Key {1}
DELETE_ADMIN_API_KEY80430Admin {0} deleted Admin API Key {1}
LICENSE_EDIT_ASSURANCE80601Admin {0} edited license options and, as a result assurance levels were edited
EDIT_PORTAL_SETTINGS80700Admin {0} edited identity router user application portal configuration
EDIT_AUTHENTICATION_SOURCES80800Admin {0} edited authentication sources
ADD_TRUSTED_LOCATION80900Admin {0} added trusted location {1}
EDIT_TRUSTED_LOCATION80901Admin {0} edited trusted location {1}
DELETE_TRUSTED_LOCATION80902Admin {0} deleted trusted location {1}
DELETE_ALL_TRUSTED_LOCATIONS80903Admin {0} deleted all trusted locations
ADD_TRUSTED_NETWORK81000Admin {0} added trusted network {1}
EDIT_TRUSTED_NETWORK81001Admin {0} edited trusted network {1}
EDIT_TRUSTED_NETWORK_LIST81002Admin {0} edited trusted network list
DELETE_TRUSTED_NETWORK81003Admin {0} deleted trusted network {1}
DELETE_ALL_TRUSTED_NETWORK81004Admin {0} deleted all trusted networks
ADD_IDENTITY_SOURCE81100Admin {0} added identity source {1}
EDIT_IDENTITY_SOURCE 81101Admin {0} edited identity source {1}
DELETE_IDENTITY_SOURCE81102Admin {0} deleted identity source {1}
SYNC_IDENTITY_SOURCE_MANUAL81103Admin {0} manually initiated synchronization for identity source {1}
ADD_IDENTITY_SOURCE_FOR_PCP81106 When admin {0} added identity source {1}; attempt was made to associate Preconfigured Access Policies to this identity source
DELETE_IDENTITY_SOURCE_FOR_PCP 81107 When admin {0} deleted identity source {1}; attempt was made to dissociate Preconfigured Access Policies to this identity source
GENERATE_SCIM_SERVICE_API_KEY81108Admin {0} generated SCIM Service API Key for identity source {2}
VIEW_SCIM_SERVICE_API_KEY81109Admin {1} viewed SCIM Service API Key for identity source {2}
COPY_SCIM_SERVICE_API_KEY81110Admin {1} copied SCIM Service API Key for identity source {2}
HIDE_SCIM_SERVICE_API_KEY81111Admin {1} hid SCIM Service API Key for identity source {2} after {3}
ADD_IDENTITY_SOURCE_REST_API81114Admin {1} added identity source {2} using REST API
DELETE_IDENTITY_SOURCE_REST_API81115Admin {1} deleted identity source {2} using REST API
REGENERATE_SCIM_SERVICE_API_KEY_REST_API81116Admin {1} regenerated SCIM Service API Key for identity source {2} using REST API
UPDATE_IDENTITY_SOURCE_REST_API81117Admin {1} updated identity source {2} using REST API
SYNC_USER81200 Admin {0} synchronized user {1}
DELETE_USER_NOW81201Admin {0} deleted user {1}
ENABLE_USER 81202 Admin {0} enabled user {1}
DISABLE_USER 81203 Admin {0} disabled user {1}
DELETE_USER_DEVICE 81204 Admin {0} deleted device {1} for user {2}
DELETE_USER_FIDOTOKEN81205 Admin {0} deleted FIDO authenticator {1} for user {2}
UNLOCK_USER_TOKENCODE 81206

Admin {0} unlocked authenticator for user {1}

EDIT_USER_DETAILS81207Admin {0} edited user details for user {1}
UNDELETE_USER81208Admin {0} undeleted user {1}
UNDELETE_BULK_USERS81209Admin {0} undeleted {1} users
DISABLE_AUTO_DELETE_USERS 81210Admin {0} disabled automatic bulk deletion of disabled users from the Cloud Authentication Service
ENABLE_AUTO_DELETE_USERS81211Admin {0} enabled automatic bulk deletion of disabled users from the Cloud Authentication Service. Users disabled for more than {1} days will be marked for deletion.
MARK_USER_FOR_DELETE81212Admin {0} marked user {1} for deletion
ADD_USER_TO_HIGHRISK_LIST81213 Admin {0} added users {1} to high risk list
REMOVE_USER_FROM_HIGHRISK_LIST81214 Admin {0} removed users {1} from high risk list
GENERATE_DEVICE_REGISTRATION_CODE81215Admin {0} generated a registration code for user {1}
UNLOCK_USER_PASSWORD_LOCKED81216 Admin {0} unlocked user
ASSIGN_HARDWARE_TOKEN81217Admin {0} assigned hardware authenticator with serial number {1} to user {2}
DISABLE_HARDWARE_TOKEN81218Admin {0} disabled hardware authenticator with serial number {1} from user {2}
ENABLE_HARDWARE_TOKEN81219Admin {0} enabled hardware authenticator with serial number {1} to user {2}
UPDATE_HARDWARE_TOKEN_NAME81220Admin {0} updated hardware authenticator with serial number {1} to user {2}
UNASSIGN_HARDWARE_TOKEN81221Admin {0} unassigned hardware authenticator with serial number {1} from user {2}
CLEAR_HARDWARE_TOKEN_PIN81222Admin {0} cleared PIN of hardware authenticator with serial number {1} from user {2}
IMPORT_HARDWARE_TOKEN81223Admin {0} imported hardware authenticator file {1}
DELETE_HARDWARE_TOKEN81225 Admin {0} deleted hardware authenticator with serial number {1}
DELETE_EXPIRED_HARDWARE_TOKEN81226Admin {0} deleted expired SecurID hardware authenticators
CLEAR_OATHHOTP_TOKEN_PIN81230Admin {0} cleared PIN of OATH HOTP hardware authenticator with serial number {1} from user {2}
UNASSIGN_OATHHOTP_TOKEN81231Admin {0} unassigned OATH HOTP hardware authenticator with serial number {1} from user {2}
DISABLE_OATHHOTP_TOKEN81232Admin {0} disabled OATH HOTP hardware authenticator with serial number {1} from user {2}
ENABLE_OATHHOTP_TOKEN81233Admin {0} enabled OATH HOTP hardware authenticator with serial number {1} to user {2}
DELETE_OATHHOTP_TOKEN81234Admin {0} deleted OATH HOTP hardware authenticator with serial number {1}
ASSIGN_OATHHOTP_TOKEN81235Admin {0} assigned OATH HOTP hardware authenticator with serial number {1} to user {2}
IMPORT_OATHHOTP_TOKEN_SUCCESSFUL81236Admin {0} imported {1} OATH HOTP hardware authenticator OTP Seed(s) from the file {2} for {3} {4} {5} a display. The OTP length is {6}
IMPORT_OATHHOTP_TOKEN_PARTIAL_SUCCESS81237Admin {0} attempted to import OATH HOTP hardware authenticator OTP Seed(s) from the file {1}. {2}
IMPORT_OATHHOTP_TOKEN_FAILED81238Admin {0} attempted to import OATH HOTP hardware authenticator OTP Seed(s) from the file {1}. {2}, so nothing was imported.
DELETE_DS100_TOKEN_OTP_AND_FIDO81250 Admin {0} deleted OTP credential for SecurID DS100 with device serial number {1} for user {2}
DELETE_DS100_TOKEN_OTP81251Admin {0} deleted OTP credential for SecurID DS100 with device serial number {1} for user {2}
DELETE_DS100_TOKEN_FIDO81252Admin {0} deleted SecurID DS100 FIDO credential {1} for user {2}
ENABLE_DS100_OTP81253Admin {0} enabled OTP credential for SecurID DS100 with device serial number {1} for user {2}
ENABLE_DS100_FIDO81254Admin {0} enabled SecurID DS100 FIDO credential {1} for user {2}
DISABLE_DS100_OTP81255Admin {0} disabled OTP credential for SecurID DS100 with device serial number {1} for user {2}
DISABLE_DS100_FIDO81256Admin {0} disabled SecurID DS100 FIDO credential {1} for user {2}
DELETE_DS100_TOKEN_OTP_REST_API81257Admin {0} deleted OTP credential for SecurID DS100 with device serial number {1}
EDIT_USER_DETAILS81258 Admin {0} edited user details for user {1}
CREATE_USER81259 Admin {0} created user {1}
GENERATE_PASSWORD_RESET_CODE_AS_DISPLAY_OTP81270Admin {0} generated a display otp type password reset code for user {1}
GENERATE_PASSWORD_RESET_CODE_AS_EMAIL_OTP81271Admin {0} generated a email otp type password reset code for user {1}{2}
GENERATE_PASSWORD_RESET_CODE_AS_VOICE_OTP81272Admin {0} generated a voice otp type password reset code for user {1}
GENERATE_PASSWORD_RESET_CODE_AS_SMS_OTP81273Admin {0} generated a sms otp type password reset code for user {1}
GENERATE_SECURE_ENROLLMENT_CODE_AS_DISPLAY_OTP81274Admin {0} generated a display otp type secure enrollment code for user {1}
GENERATE_SECURE_ENROLLMENT_CODE_AS_EMAIL_OTP81275Admin {0} generated a email otp type secure enrollment code for user {1}{2}
GENERATE_SECURE_ENROLLMENT_CODE_AS_VOICE_OTP81276Admin {0} generated a voice otp type secure enrollment code for user {1}
GENERATE_SECURE_ENROLLMENT_CODE_AS_SMS_OTP81277Admin {0} generated a sms otp type secure enrollment code for user {1}
GENERATE_PASSWORD_RESET_CODE81278Admin {0} generated a password reset code
GENERATE_SECURE_ENROLLMENT_CODE81279Admin {0} generated a secure enrollment code
VOID_SECURE_ENROLLMENT_CODE81280Admin {0} voided a secure enrollment code
VOID_PASSWORD_RESET_CODE81281Admin {0} voided a password reset code
ENABLE_FIDO_TOKEN81290Admin {0} enabled FIDO token {1} for user {2}
DISABLE_FIDO_TOKEN81291Admin {0} disabled FIDO token {1} for user {2}
ADD_IDENTITY_PROVIDER81300Admin {0} added identity provider {1}
EDIT_IDENTITY_PROVIDER 81301Admin {0} edited identity provider {1}
DELETE_IDENTITY_PROVIDER 81302Admin {0} deleted identity provider {1}
GENERATE_USER_REPORT81400Admin {0} generated user report {1}
DOWNLOAD_USER_REPORT81401Admin {0} downloaded user report {1}
CANCEL_USER_REPORT81402Admin {0} canceled user report {1}

Administration Log Messages for Cloud Access Service (82000 - 82562)