Audits and logs
Audits in IG record access to a route. Audit logs in operating systems detect system login attempts and changes to the software.
The IG audit logging service adheres to the log structure common across the ForgeRock Identity Platform. For information, refer to Auditing your deployment.
Prevent logging of sensitive data for audit events by excluding fields from the audit logs. For information, refer to Including or excluding audit event fields in logs.
Logs in IG contain informational, error, and warning events, to troubleshoot and debug transactions and events that take place within the IG instance.
Protect logs from unauthorised access, and make sure they contain a minimum of sensitive or personally identifiable information that could be used in attacks.
When using a CaptureDecorator, mask captured header and attribute values to avoid disclosing information, such as token values or passwords. For information, refer to CaptureDecorator.
Limit the number of repeat log messages to prevent log flow attacks, by adding
logback.xml with a
information, refer to
Limit repetitive log messages.