Get Security Audits
Retrieve security audit events such as login attempts, token operations, and permission denials.Query Parameters
Filter by security action type:
LoginSucceeded- Successful login attemptsLoginFailed- Failed login attemptsTokenIssued- JWT token issuanceTokenRevoked- JWT token revocationPasswordChanged- Password change eventsRoleAssigned- User role assignmentsRoleRevoked- User role removalsPermissionDenied- Authorization failuresPolicyFailed- Authorization policy failures
Filter by user identifier
Filter by tenant identifier
Start date/time for audit events (UTC)
End date/time for audit events (UTC)
Authorization
RequiresPermissions.Auditing.View permission.
Response
Returns an array of security audit summary objects.Unique audit event identifier
When the security event occurred
Always
Security for this endpointEvent severity:
Trace, Debug, Information, Warning, Error, CriticalAssociated tenant identifier
User who triggered the event
Display name of the user
Distributed tracing identifier
Correlation identifier for related events
HTTP request identifier
Source system or component that generated the audit
Bitwise flags for additional metadata:
PiiMasked- Contains masked personally identifiable informationOutOfQuota- Event occurred during quota violationSampled- Event was sampled for performanceRetainedLong- Event will be retained longer than normalHealthCheck- Related to health check operationsAuthentication- Authentication-related eventAuthorization- Authorization-related event
Common Use Cases
Monitor Failed Login Attempts
Track potential security threats by monitoring failed logins:- Multiple failures from same user (potential brute force)
- Multiple failures from same IP (potential attack)
- Failures outside business hours
Track Permission Denials
Identify authorization issues or potential privilege escalation attempts:Audit Administrative Changes
Monitor role assignments and revocations:Investigate User Activity
Get all security events for a specific user:Tenant Security Overview
Review security events for a specific tenant:Security Action Types
LoginSucceeded
LoginSucceeded
Recorded when a user successfully authenticates.Severity: Information
Use: Track user access patterns, login times, device usage
Use: Track user access patterns, login times, device usage
LoginFailed
LoginFailed
Recorded when authentication fails (wrong password, non-existent user, etc.).Severity: Warning
Use: Detect brute force attacks, identify account issues
Use: Detect brute force attacks, identify account issues
TokenIssued
TokenIssued
Recorded when a JWT token is issued to a user.Severity: Information
Use: Track token lifecycle, audit API access
Use: Track token lifecycle, audit API access
TokenRevoked
TokenRevoked
Recorded when a token is explicitly revoked before expiration.Severity: Information
Use: Track forced logouts, security incident response
Use: Track forced logouts, security incident response
PasswordChanged
PasswordChanged
Recorded when a user changes their password.Severity: Information
Use: Audit password policy compliance, detect compromised accounts
Use: Audit password policy compliance, detect compromised accounts
RoleAssigned
RoleAssigned
Recorded when a role is assigned to a user.Severity: Information
Use: Track permission changes, audit administrative actions
Use: Track permission changes, audit administrative actions
RoleRevoked
RoleRevoked
Recorded when a role is removed from a user.Severity: Information
Use: Track permission changes, audit administrative actions
Use: Track permission changes, audit administrative actions
PermissionDenied
PermissionDenied
Recorded when authorization fails due to missing permissions.Severity: Warning
Use: Detect privilege escalation attempts, identify permission gaps
Use: Detect privilege escalation attempts, identify permission gaps
PolicyFailed
PolicyFailed
Recorded when a custom authorization policy fails.Severity: Warning
Use: Audit complex authorization rules, debug policy issues
Use: Audit complex authorization rules, debug policy issues
Security audits are automatically tagged with the
Authentication or Authorization flag for quick filtering.