Skip to main content

HelloID

Provisioning audit log reports

This report space contains Audit log reports for HelloID's Provisioning module.

Entitlement actions (audit log reports)
Entitlement Actions - Successful Overview (audit log report)

Shows recent successful entitlement actions in Target systems (including Grant, Revoke, and Update actions).

2022-08-19_14-05-11.jpg
Entitlement Actions - Person Overview (audit log report)

Shows recent entitlement actions by by person. This is the same data shown when you View a person's audit logs.

2022-08-19_14-13-29.jpg
Source systems (audit log reports)
Source Systems - Overview (audit log report)

Shows recent Source snapshots in Source systems.

Target systems (audit log reports)
Target Systems - Successful Overview (audit log report)

Shows recent successful entitlement actions in Target systems (including Grant, Revoke, and Update actions), with a focus on disaggregation by target system.

2022-08-19_13-52-51.jpg
Business Rules (audit log reports)
Business Rules - Configuration Changes (audit log report)

Shows recent changes to Business rules, including the user who made the change.

2023-02-27_13-12-19.jpg
Person Aggregation (audit log reports)
Automatic - Person Aggregation Overview (audit log report)

Shows recent Person aggregation actions.

2023-02-27_13-15-20.jpg
User Actions (audit log reports)
User Action - Approve Thresholds (audit log report)

Shows recently approved Blocked imports (systemType = Source) and recently approved Blocked actions (systemType = Target).

2023-02-27_13-30-21.jpg
User Action - Source systems changes (audit log report)

Shows changes made to the configuration of provisioning source systems. This includes changes in the system configuration, mapping, person import and department import scripts, and thresholds.

AuditLogs_Prov_UserAction_SourceSystem.png
User Action - Target systems changes (audit log report)

Shows changes made to the configuration of provisioning target systems. This includes changes in the system configuration, mapping, resource configuration, scripts, correlation configuration, thresholds, and (for Active Directory target systems) uniqueness validation.

Currently, only Active Directory and PowerShell v2 target systems are included in the report.

AuditLogs_Prov_UserAction_TargetSystem.png