Administration Log Messages for Cloud Access Service (82000 - 82562)
Administration Log Messages for Cloud Access Service (82000 - 82562)
The Cloud Administration Console generates audit log messages that describe Super Admin activities.
Note: Use the Log Events API to write a client program that retrieves and delivers these messages. For more information, see Manage Legacy Clients (API Keys).
| Activity Key | Activity Code | Message |
|---|---|---|
| ADD_ADMIN_USER | 82000 | Admin {0} added admin user {1} |
| EDIT_ADMIN_USER | 82001 | Admin {0} edited admin user {1} |
| DELETE_ADMIN_USER | 82002 | Admin {0} deleted admin user {1} |
| EDIT_ADMIN_USER_PROFILE | 82003 | Admin {0} edited profile for admin user {1} |
| ENABLE_ADMIN_IDR_REST_API_ACCESS | 82004 | Admin {0} enabled admin user {1} for identity router REST API access |
| DISABLE_ADMIN_IDR_REST_API_ACCESS | 82005 | Admin {0} disabled admin user {1} for identity router REST API access |
| EDIT_ADMIN_IDR_REST_API_ACCESS | 82006 | Admin {0} edited admin user {1} identity router REST API access settings |
| UNLOCK_ADMIN_USER | 82007 | Admin {0} unlocked admin user {1} |
| ENABLE_SUPPORT_ADMIN | 82100 | Admin {0} enabled SecurID Customer Support access from {1} to {2} |
| DISABLE_SUPPORT_ADMIN | 82101 | Admin {0} disabled SecurID Customer Support access |
| EDIT_COMPANY_SETTINGS | 82200 | Admin {0} edited company settings |
| DELETE_CERTIFICATE_CHAIN | 82201 | Admin {0} deleted the certificate chain for IDR proxied applications (HTTP Federation Proxy, Trusted Header, and NTLM) |
| ADD_APPLICATION | 82300 | Admin {0} added application {1} with type {2} |
| EDIT_APPLICATION | 82301 | Admin {0} edited application {1} |
| DELETE_APPLICATION | 82302 | Admin {0} deleted application {1} |
| ADD_RADIUS_CLIENT | 82400 | Admin {0} added RADIUS client {1} |
| EDIT_RADIUS_CLIENT | 82401 | Admin {0} edited RADIUS client {1} |
| DELETE_RADIUS_CLIENT | 82402 | Admin {0} deleted RADIUS client {1} |
| ADD_RELYING_PARTY | 82500 | Admin {0} added relying party {1} |
| EDIT_RELYING_PARTY | 82501 | Admin {0} edited relying party {1} |
| DELETE_RELYING_PARTY | 82502 | Admin {0} deleted relying party {1} |
| ADD_EPIC_RELYING_PARTY | 82510 | Admin {0} added EPIC Relying Party {1} |
| EDIT_EPIC_RELYING_PARTY | 82511 | Admin {0} edited EPIC Relying Party {1} |
| DELETE_EPIC_RELYING_PARTY | 82512 | Admin {0} deleted EPIC Relying Party {1} |
| GENERATE_ONLINE_EMERGENCY_TOKENCODE | 82560 | Admin {0} generated an online Emergency Tokencode for user {1} to expire in {2} days |
| DISABLE_ONLINE_EMERGENCY_TOKENCODE | 82561 | Admin {0} disabled the online Emergency Tokencode for user {1} |
| GENERATE_OFFLINE_EMERGENCY_TOKENCODE | 82562 | Admin {0} generated an offline Emergency Tokencode for user {1} which expires on {2} |
| OPERATIONS_EDIT_COMPANY | 82580 | Admin {0} edited company settings {1} |
| EDIT_CLOUD_SSO_CONFIGURATION | 82594 | Admin {0} edited My Page Self Service configuration, Single Sign-On portal configuration and portal customization settings |
| GENERATE_ONLINE_EMERGENCY_TOKENCODE | 82560 | Admin {0} generated an online Emergency Access Code for user {1} to expire in {2} days |
| DISABLE_ONLINE_EMERGENCY_TOKENCODE | 82561 | Admin {0} disabled the online Emergency Access Code for user {1} |
| GENERATE_OFFLINE_EMERGENCY_TOKENCODE | 82562 | Admin {0} generated an offline Emergency Access Code for user {1} which expires on {2} |
| LIVE_VERIFY_START | 93000 | Admin {0} started live verify for user {1} |
| LIVE_VERIFY_SUCCESS | 93001 | Admin {0} successfully verified user {1} through live verify |
| LIVE_VERIFY_FAILURE | 93002 | Admin {0} failed to verify user {1} through live verify |
| LIVE_VERIFY_CANCEL | 93003 | Admin {0} cancelled live verify for user {1} |
| LIVE_VERIFY_REFRESH | 93004 | Admin {0} refreshed the live verify session for user {1} |
Related Articles
RSA Authentication Agent 1.0.1 for Active Directory Federation Services (AD FS) sends domain\samAccountName instead of UPN… 70Number of Views Termination Date is not populated with the Account Expires date when running an Active Directory Identity Collector (IDC) … 109Number of Views How to access the aveksaServer.log and aveksaServerInfo.log files in RSA Identity Governance & Lifecycle 158Number of Views Role changes are not accurately reflected under the User Access tab or in a User Access Review in RSA Identity Governance … 741Number of Views Unchallenged Active Directory users fail to authenticate with RSA Authentication Agent for PAM 284Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?