Administration Log Messages for the Cloud Authentication Service

The Cloud Administration Console generates audit log messages that describe Super Admin activities.

Note: Use the Log Events API to write a client program that retrieves and delivers these messages. For more information, see Manage the Cloud Administration API Keys.

Activity Key Activity Code Message
SIGNIN_SUCCESS 80001 Admin {0} successfully signed in
SIGNIN_FAILURE 80002 Admin {0} sign-in failed
LOCKED_ADMIN_ACCOUNT 80003 System locked admin {0} account
UNLOCKED_ADMIN_ACCOUNT 80004 System unlocked admin {0} account
REQUESTED_PASSWORD_RESET 80005 Admin {0} requested password reset
RESET_PASSWORD 80006 Admin {0} reset password
SIGNOUT 80007 Admin {0} signed out
SIGNIN_ADDITIONAL_AUTHENTICATION_REQUESTED 80008 Admin {0} successfully sent additional authentication request
PUBLISH 80100 Admin {0} published to identity routers, result: {1}, and published to Cloud Authentication Service, result: {2}
ADD_POLICY 80200 Admin {0} added access policy {1}
EDIT_POLICY 80201 Admin {0} edited access policy {1}
DELETE_POLICY 80202 Admin {0} deleted access policy {1}
ADD_IDR 80300 Admin {0} added identity router {1}
EDIT_IDR 80301 Admin {0} edited identity router {1}
DELETE_IDR 80302 Admin {0} deleted identity router {1}
TEST_IDR 80303 Admin {0} tested identity router {1}
REBOOT_IDR 80304 Admin {0} rebooted identity router {1}
RESTART_IDR 80305 Admin {0} restarted identity router {1}
APPLY_IDR_LOG_LEVEL 80306 Admin {0} set the identity router {1} log level
VIEW_IDR_LOG 80307 Admin {0} viewed the identity router {1} log
RESET_IDR_PASSWORD 80308 Admin {0} reset the identity router {1} password
UPDATE_IDR 80309 Admin {0} updated identity router {1} software
DOWNLOAD_IDR_LOG 80310 Admin {0} downloaded the identity router {1} log
DOWNLOAD_IDR_IMAGE 80311 Admin {0} downloaded identity router image
ADD_CLUSTER 80320 Admin {0} added cluster {1}
EDIT_CLUSTER 80321 Admin {0} edited cluster {1}
DELETE_CLUSTER 80322 Admin {0} deleted cluster {1}
UPDATE_CLUSTER 80323 Admin {0} updated identity router software for cluster {1}
EDIT_CLUSTER_RELATIONSHIPS 80324 Admin {0} edited cluster relationships
ADD_CLUSTER_UPDATE_SCHEDULE 80325 Admin {0} added a schedule for updating identity routers in cluster {1} at {2}
EDIT_CLUSTER_UPDATE_SCHEDULE 80326 Admin {0} updated a schedule for updating identity routers in cluster {1} at {2}
ADD_CLUSTER_BACKUP 80330 Admin {0} added cluster {1} backup
EDIT_CLUSTER_BACKUP 80331 Admin {0} edited cluster {1} backup
DELETE_CLUSTER_BACKUP 80332 Admin {0} deleted cluster {1} backup
EDIT_BACKUP_SCHEDULE 80333 Admin {0} updated cluster backup schedule
BACKUP_NOW 80334 Admin {0} backed up a cluster {1}
RESTORE_BACKUP 80335 Admin {0} restored a cluster {1}
EDIT_AUDIT_CONFIGURATION 80340 Admin {0} edited audit log configuration
EDIT_CA_CERTIFICATES 80350 Admin {0} edited CA certificates
EDIT_ENCRYPTION_SETTINGS 80351 Admin {0} edited encryption settings
ADD_AM_CONFIGURATION 80360 Admin {0} added Authentication Manager connection
EDIT_AM_CONFIGURATION 80361 Admin {0} edited Authentication Manager connection
TEST_AM_CONNECTION 80362 Admin {0} tested Authentication Manager connection
GENERATE_AM_CODE 80363 Admin {0} generated the Authentication Manager registration code
REGISTER_AM_CODE 80364 Authentication Manager registered with Cloud Authentication Service using generated code
GENERATE_AM_CONFIGURATION 80365 Admin {0} generated Cloud Authentication Service configuration for Authentication Manager using keys {1}
ENABLE_HA_TOKENCODE 80366 Admin {0} enabled High Availability OTP for Authentication Manager
DISABLE_HA_TOKENCODE 80367 Admin {0} disabled High Availability OTP for Authentication Manager
ADD_ADMIN_API_KEY 80400 Admin {0} added Admin API Key {1}
EDIT_ADMIN_API_KEY 80410 Admin {0} edited Admin API Key {1}
REGENERATE_ADMIN_API_KEY 80420 Admin {0} regenerated Admin API Key {1}
DELETE_ADMIN_API_KEY 80430 Admin {0} deleted Admin API Key {1}
EDIT_ASSURANCE 80600 Admin {0} edited assurance levels
EDIT_PORTAL_SETTINGS 80700 Admin {0} edited portal settings
EDIT_AUTHENTICATION_SOURCES 80800 Admin {0} edited authentication sources
ADD_TRUSTED_LOCATION 80900 Admin {0} added trusted location {1}
EDIT_TRUSTED_LOCATION 80901 Admin {0} edited trusted location {1}
DELETE_TRUSTED_LOCATION 80902 Admin {0} deleted trusted location {1}
DELETE_ALL_TRUSTED_LOCATIONS 80903 Admin {0} deleted all trusted locations
ADD_TRUSTED_NETWORK 81000 Admin {0} added trusted network {1}
EDIT_TRUSTED_NETWORK 81001 Admin {0} edited trusted network {1}
EDIT_TRUSTED_NETWORK_LIST 81002 Admin {0} edited trusted network list
DELETE_TRUSTED_NETWORK 81003 Admin {0} deleted trusted network {1}
DELETE_ALL_TRUSTED_NETWORK 81004 Admin {0} deleted all trusted networks
ADD_IDENTITY_SOURCE 81100 Admin {0} added identity source {1}
EDIT_IDENTITY_SOURCE 81101 Admin {0} edited identity source {1}
DELETE_IDENTITY_SOURCE 81102 Admin {0} deleted identity source {1}
SYNC_IDENTITY_SOURCE_MANUAL 81103 Admin {0} manually initiated synchronization for identity source {1}
GENERATE_SCIM_SERVICE_API_KEY 81108 Admin {0} generated SCIM Service API Key for identity source {2}
VIEW_SCIM_SERVICE_API_KEY 81109 Admin {1} viewed SCIM Service API Key for identity source {2}
COPY_SCIM_SERVICE_API_KEY 81110 Admin {1} copied SCIM Service API Key for identity source {2}
HIDE_SCIM_SERVICE_API_KEY 81111 Admin {1} hid SCIM Service API Key for identity source {2} after {3}
SYNC_USER 81200 Admin {0} synchronized user {1}
DELETE_USER_NOW 81201 Admin {0} deleted user {1}
ENABLE_USER 81202 Admin {0} enabled user {1}
DISABLE_USER 81203 Admin {0} disabled user {1}
DELETE_USER_DEVICE 81204 Admin {0} deleted device {1} for user {2}
DELETE_USER_FIDOTOKEN 81205 Admin {0} deleted FIDO authenticator {1} for user {2}
UNLOCK_USER_TOKENCODE 81206

Admin {0} unlocked authenticator for user {1}

EDIT_USER_SMS_VOICE_PHONE 81207 Admin {0} edited SMS or Voice OTP phone number for user {1}
UNDELETE_USER 81208 Admin {0} undeleted user {1}
UNDELETE_BULK_USERS 81209 Admin {0} undeleted {1} users
DISABLE_AUTO_DELETE_USERS 81210 Admin {0} disabled the auto-delete users setting
ENABLE_AUTO_DELETE_USERS 81211 Admin {0} enabled the auto-delete users setting. Users disabled for more than n days will be automatically marked for deletion.
MARK_USER_FOR_DELETE 81212 Admin {0} marked user {1} for deletion
GENERATE_DEVICE_CODE 81215 Admin {0} generated a device registration code for user {1}
ASSIGN_HARDWARE_TOKEN 81217 Admin {0} assigned hardware authenticator with serial number {1} to user {2}
DISABLE_HARDWARE_TOKEN 81218 Admin {0} disabled hardware authenticator with serial number {1} from user {2}
ENABLE_HARDWARE_TOKEN 81219 Admin {0} enabled hardware authenticator with serial number {1} to user {2}
UPDATE_SID_HARDWARE_TOKEN_NAME 81220 Admin {0} updated hardware authenticator with serial number {1} to user {2}
UNASSIGN_HARDWARE_TOKEN 81221 Admin {0} unassigned hardware authenticator with serial number {1} from user {2}
CLEAR_HARDWARE_TOKEN_PIN 81222 Admin {0} cleared PIN of hardware authenticator with serial number {1} from user {2}
IMPORT_HARDWARE_TOKEN 81223 Admin {0} imported hardware authenticator file {1}
DELETE_EXPIRED_HARDWARE_TOKEN 81226 Admin {0} deleted expired SecurID hardware authenticators
DELETE_DS100_TOKEN_OTP 81251 Admin {0} deleted OTP credential for SecurID DS100 with device serial number {1} for user {2}
DELETE_DS100_TOKEN_FIDO 81252 Admin {0} deleted SecurID DS100 FIDO credential {1} for user {2}
ENABLE_DS100_OTP 81253 Admin {0} enabled OTP credential for SecurID DS100 with device serial number {1} for user {2}
ENABLE_DS100_FIDO 81254 Admin {0} enabled SecurID DS100 FIDO credential {1} for user {2}
DISABLE_DS100_OTP 81255 Admin {0} disabled OTP credential for SecurID DS100 with device serial number {1} for user {2}
DISABLE_DS100_FIDO 81256 Admin {0} disabled SecurID DS100 FIDO credential {1} for user {2}
DELETE_DS100_TOKEN_OTP_REST_API 81257 Admin {0} deleted OTP credential for SecurID DS100 with device serial number {1}
ENABLE_FIDO_TOKEN 81290 Admin {0} enabled FIDO token {1} for user {2}
DISABLE_FIDO_TOKEN 81291 Admin {0} disabled FIDO token {1} for user {2}
ADD_IDENTITY_PROVIDER 81300 Admin {0} added identity provider {1}
EDIT_IDENTITY_PROVIDER 81301 Admin {0} edited identity provider {1}
DELETE_IDENTITY_PROVIDER 81302 Admin {0} deleted identity provider {1}
GENERATE_USER_REPORT 81400 Admin {0} generated user report {1}
DOWNLOAD_USER_REPORT 81401 Admin {0} downloaded user report {1}
CANCEL_USER_REPORT 81402 Admin {0} canceled user report {1}
ADD_ADMIN_USER 82000 Admin {0} added admin user {1}
EDIT_ADMIN_USER 82001 Admin {0} edited admin user {1}
DELETE_ADMIN_USER 82002 Admin {0} deleted admin user {1}
EDIT_ADMIN_USER_PROFILE 82003 Admin {0} edited profile for admin user {1}
ENABLE_ADMIN_IDR_REST_API_ACCESS 82004 Admin {0} enabled admin user {1} for identity router REST API access
DISABLE_ADMIN_IDR_REST_API_ACCESS 82005 Admin {0} disabled admin user {1} for identity router REST API access
EDIT_ADMIN_IDR_REST_API_ACCESS 82006 Admin {0} edited admin user {1} identity router REST API access settings
UNLOCK_ADMIN_USER 82007 Admin {0} unlocked admin user {1}
ENABLE_SUPPORT_ADMIN 82100 Admin {0} enabled SecurID Customer Support access from {1} to {2}
DISABLE_SUPPORT_ADMIN 82101 Admin {0} disabled SecurID Customer Support access
EDIT_COMPANY_SETTINGS 82200 Admin {0} edited company settings
DELETE_CERTIFICATE_CHAIN 82201 Admin {0} deleted the certificate chain
ADD_APPLICATION 82300 Admin {0} added application {1} with type {2}
EDIT_APPLICATION 82301 Admin {0} edited application {1}
DELETE_APPLICATION 82302 Admin {0} deleted application {1}
ADD_RADIUS_CLIENT 82400 Admin {0} added RADIUS client {1}
EDIT_RADIUS_CLIENT 82401 Admin {0} edited RADIUS client {1}
DELETE_RADIUS_CLIENT 82402 Admin {0} deleted RADIUS client {1}
ADD_RELYING_PARTY 82500 Admin {0} added relying party {1}
EDIT_RELYING_PARTY 82501 Admin {0} edited relying party {1}
DELETE_RELYING_PARTY 82502 Admin {0} deleted relying party {1}
GENERATE_ONLINE_EMERGENCY_TOKENCODE 82560 Admin {0} generated an online Emergency Tokencode for user {1} to expire in {2} days
DISABLE_ONLINE_EMERGENCY_TOKENCODE 82561 Admin {0} disabled the online Emergency Tokencode for user {1}
GENERATE_OFFLINE_EMERGENCY_TOKENCODE 82562 Admin {0} generated an offline Emergency Tokencode for user {1} which expires on {2}
OPERATIONS_EDIT_COMPANY 82580 Admin {0} edited company settings {1}
EDIT_FIDO_RP_ID 85001 Admin {0} edited the Host Name (FIDO_RP_ID) {1}