RSA Product/Service Type: Cloud Authentication Service
RSA Version/Condition: all
For troubleshooting or audit purposes it can be useful to see a history of user authentications and other events, such as device registrations.
Usually, you can Monitor User Events in the Cloud Administration Console . However, only a limited number of the most recent events are displayed there. To see events that go back further in time, there are APIs that can be used instead:
The Cloud Administration APIs are REST-based web service interfaces. The above two APIs can be used by third-party SIEM tools that support a REST API to fetch user audit events.
The Cloud Administration APIs come with a Command Line Utility (CLU) tool that is useful for ad hoc retrieval of event logs without a third-party tool.
This article explains how to use the CLU tool to retrieve User Event audit logs. Article Download RSA SecurID Access Cloud Administration audit logs using Cloud Administration REST API CLU explains how to use the same tool to retrieve Administration Event audit logs.
Here are the basic steps to download User Event actions (audit records) for all users, using the API package's command line utility (CLU). Events are downloaded from the last 24 hours. To download events from other times, see section Specifying Time Period below.
- Download the RSA SecurID Access Administration REST API to any Windows or Linux machine that has Java installed and network connectivity to your Cloud Administration Console.
- Unzip the downloaded package file to a convenient directory location.
- From the Cloud Administration Console Add an API Key File and download it to the machine where you unzipped the Administration REST API.
- From the top-level directory of the unzipped API package run the CLU shown below, typed all on one line (note that the example syntax is on Windows):
.\bin\rsa-securidaccess-rest-client-sdk.bat -f <path to API key file> -o exportAllUserEventLog -u https://<CAC FQDN>/AdminInterface/restapi/v1
Where:
- <path to API key file> is the downloaded API key file. If there are spaces in the path, the path must be surrounded in double quotes (see examples in section Specifying Time Period below).
- <CAC FQDN> should be substituted with the fully-qualified domain name of your Cloud Administration Console:
- Americas customers use <company subdomain>.access.securid.com
- EMEA customers use <company subdomain>.access-eu.securid.com.
- Asia-Pacific customers use: <company subdomain>.access-anz.securid.com.
- India customers use: <company subdomain>.access-in.securid.com.
- Japan customers use: <company subdomain>.access-jp.securid.com.
The file exportAllUserEventLog.csv will be written to the current working directory.
Specifying Time Period
By default, the command reports on the last 24-hour period. Alternatively, a specific time period of interest can be specified with the additional command line switches -s (start time period) and/or -e (end time period).
Date and time must be specified in ISO 8601 Date Time format: yyyy-mm-ddThh:mm:ss.tttShh:mm where ttt is milliseconds and Shh:mm is the UTC offset where S must be - (dash or minus sign) for a negative offset or + (plus sign) for a positive offset. All components of the date and time must be specified, including seconds, milliseconds and UTC offset. The duration must not exceed 7 days.
Negative UTC Offset Example
This example uses UTC -0800 (Type the command all on one line (note that the example syntax is on Windows):
.\bin\rsa-securidaccess-rest-client-sdk.bat -f 5c221bc1-a69e-4a78-8d2f-c0646ba4d91d.key -o exportAllUserEventLog -u https://mysubdomain.access.securid.com/AdminInterface/restapi/v1 -s 2021-07-01T11:22:12.828-08:00 -e 2021-07-05T11:22:12.828-08:00
Positive UTC Offset Example
This example uses UTC +1000 (Type the command all on one line (note that the example syntax is on Windows):
.\bin\rsa-securidaccess-rest-client-sdk.bat -f "c:\temp\RSA API\5c221bc1-a69e-4a78-8d2f-c0646ba4d91d.key" -o exportAllUserEventLog -u https://mysubdomain.access-anz.securid.com/AdminInterface/restapi/v1 -s 2021-09-30T09:15:00.000+10:00 -e 2021-10-04T23:59:59.999+10:00
UTC Example
This example uses UTC (Type the command all on one line (note that the example syntax is on Windows):
.\bin\rsa-securidaccess-rest-client-sdk.bat -f "c:\temp\RSA API\ea9e8e60-cde6-425c-8161-af967a157927.key" -o exportAllUserEventLog -u https://mysubdomain.access-eu.securid.com/AdminInterface/restapi/v1 -s 2021-09-30T09:15:00.000Z -e 2021-10-04T23:59:59.999Z
- The rsa-securidaccess-rest-client.sdk CLU requires Java to be installed on the computer where it will be run.
- JAVA_HOME must be set (JAVA_HOME is an environment variable that indicates where in the file system the JDK or JRE is installed, e.g. C:\Program Files (x86)\Java\jre1.8.0_333).
- These instructions assume the Windows PATH environment variable has been updated to include the Java bin directory/folder, e.g. on Windows, that would be %JAVA_HOME%\bin.
- Run the rsa-securidaccess-rest-client.sdk CLU with no switches to see all of the available command options:
.\bin\rsa-securidaccess-rest-client-sdk.bat
- Some versions of the rsa-securidaccess-rest-client.sdk CLU, up to and including v2.7.1, do not support Positive UTC time offsets for the -s and -e options. Upgrade to v2.7.2 or later to fix the issue. Or, as a workaround, specify times in UTC (see "UTC Example" above).
Related Articles
Download RSA SecurID Access Cloud Administration audit logs using Cloud Administration REST API CLU 1.36KNumber of Views Error Unable to resolve user by login ID and/or alias, or authenticator not assigned to user when attempting to authentica… 2.05KNumber of Views Unable to add or manage user in RSA Authentication Manager; getting the error: The specified ID is already in use by unre… 5.06KNumber of Views RSA Authentication Manager 8.8 upgrade fails with ERROR: auth_manager.rest_service.old_access_key is not found 1.89KNumber of Views Downloading RSA Authentication Manager license files or RSA Software token seed records 2.46KNumber of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x