Skip to main content
Audit Logs is a beta feature. This feature is functional and supported, but is still undergoing regular changes. Audit logging requires enablement for your organization — contact your Strata account team or Strata support to enable it.
Console audit logs give you a complete record of every administrative action taken in your Maverics Console. Whether you need to investigate a misconfigured deployment, demonstrate compliance to an auditor, or simply answer “who changed that?” — audit logs provide the evidence.

What Are Console Audit Logs?

Every action that administrators perform in the Console is recorded as a log entry — who performed the action, what resource was affected, when it happened, and whether it succeeded or failed. Publishing a config bundle, inviting a team member, updating a deployment, uploading a TLS certificate — each of these actions produces a structured audit record. Audit logs matter for three reasons:
  • Compliance evidence — Audit logs provide the admin-action audit trail required by frameworks like SOC 2, HIPAA, and GDPR. They prove who made configuration changes, when, and whether those changes were authorized.
  • Security investigations — When something goes wrong — a misconfigured policy, an unauthorized deployment publish — audit logs let you trace the exact sequence of actions that led to the issue, including the actor, IP address, and timestamp.
  • Operational accountability — In multi-admin environments, audit logs establish clear ownership of every change. You can answer “who published that config?” or “who removed that team member?” without guessing.

Console Logs vs. Orchestrator Logs

Console audit logs capture management plane actions: configuration changes, bundle publishing, team membership, organization settings — everything administrators do in the Console UI. The Orchestrator, by contrast, captures data plane actions: user authentication events, authorization decisions, token issuance, and proxy requests — everything that happens at runtime when end users interact with protected applications. Together, Console audit logs and Orchestrator logs provide complete audit coverage across both administrative and runtime operations. For Orchestrator-side logging, see the Compliance and Audit guide and the Telemetry Reference.

Accessing Audit Logs

Audit logs are accessible through the Console UI. You can filter by time range, event category, and specific event type to find relevant entries. JSON/CSV export and SIEM streaming are on the roadmap — see Export and Integration below.

Schema (v1.0)

Every audit log entry follows the v1.0 schema. The top-level structure contains identifying information, the event classification, and nested objects describing the actor, target, source, context, and request.

Top-Level Fields

FieldTypeDescription
idstring (MRN)Maverics Resource Notation identifier for the audit event
versionstringSchema version (currently "1.0")
timestampstring (RFC 3339)When the event occurred
eventTypestringSpecific event identifier (e.g., deployment.publish)
categorystringEvent category (e.g., deployment_management)
outcomeobjectResult of the action — see Outcome
actorobjectWho performed the action — see Actor
targetobjectWhat was acted upon — see Target
sourceobjectWhere the request came from — see Source
contextobjectTracing and service information — see Context
requestobjectHTTP request details — see Request
metadataobjectAdditional event-specific data — see Metadata
MRN format: The id field and target.id use Maverics Resource Notation (MRN), a structured identifier with the format:
maverics:{region}:{organization_id}:{resource_type}:{resource_id}
For example: maverics:us-west-2:550e8400-e29b-41d4-a716-446655440000:audit-log:7c9e6679-7425-40de-944b-e07fc1f90ae7

Outcome

The outcome object records the result of the action.
FieldTypeDescription
statusstringOutcome status (see values below)
statusCodeintegerHTTP status code of the response
errorMsgstringDetailed error message for debugging
reasonstringHuman-readable explanation of the outcome
Status values:
ValueDescription
successAction completed successfully
failureAction failed due to validation or business logic
partialAction partially completed (e.g., bulk operation with some failures)
deniedAction blocked by authorization policy
errorSystem error prevented action completion

Actor

The actor object identifies who performed the action.
FieldTypeDescription
typestringActor type (see values below)
idstringUnique identifier (user ID, API key ID, or service name)
emailstringActor’s email address (for user and admin_user actors)
displayNamestringHuman-readable name
organizationIDstringOrganization context for the action
organizationNamestringOrganization name for readability
Actor types:
ValueDescription
userHuman user authenticated via UI or API
admin_userPlatform administrator authenticated via admin console
api_keyProgrammatic access via API key
systemAutomated system process (e.g., scheduled jobs)
serviceInternal service-to-service calls

Target

The target object identifies what was acted upon.
FieldTypeDescription
typestringResource type (see values below)
idstringMRN (Maverics Resource Notation) identifier for the target resource
namestringHuman-readable resource name
organizationIDstringOwning organization
Resource types:
ValueDescription
organizationOrganization/account
organization_unitOrganizational unit
userUser account
membershipOrganization membership
invitationUser invitation
deploymentDeployment/environment
deployment_revisionDeployment revision/version
identity_fabricIdentity Fabric configuration
user_flowAuthentication user flow
user_flow_policyUser flow policy rule
applicationApplication registration
serviceProvider service (OIDC, SAML, LDAP, MCP)
tls_configTLS configuration
cacheDeployment cache
api_keyAPI key
service_extensionCustom service extension
orchestratorOrchestrator instance
feature_flagFeature flag (global or account-level)
sso_domainSSO domain configuration
admin_userPlatform administrator user
database_migrationDatabase migration job

Source

The source object records where the request originated.
FieldTypeDescription
ipAddressstringClient IP address
userAgentstringRaw User-Agent header
clientTypestringClient type (see values below)
Client types: browser, api_client, sdk, service, unknown

Context

The context object provides tracing and service metadata for correlating events across services.
FieldTypeDescription
regionstringRegion where the request was processed
servicestringService that handled the request
serviceVersionstringVersion of the service
traceIDstringDistributed trace identifier
spanIDstringSpan identifier within the trace

Request

The request object captures HTTP-level details about the API call.
FieldTypeDescription
methodstringHTTP method (e.g., GET, POST, PUT, DELETE, PATCH)
pathstringRequest URL path
queryParamsstringQuery string parameters
referrerstringHTTP Referer header value
contentLengthintegerSize of the request body in bytes
contentTypestringContent-Type header value
The API uses camelCase JSON serialization for all fields (e.g., eventType, statusCode, displayName, ipAddress, clientType, userAgent, traceID, spanID, queryParams, contentLength, contentType).

Metadata

The metadata object is a flexible key-value store for domain-specific context that doesn’t fit the standard schema fields. The keys present in metadata vary by event type, providing additional detail relevant to the specific action.

Reserved Metadata Keys

The following keys have a defined meaning across all event types:
KeyTypeDescription
bulk_operationstring ("true")Present when the audit log entry is part of a bulk action (e.g., deleting multiple applications in a single request). Each item in the bulk action gets its own audit log entry with this key set. Use context.traceID to correlate all entries from the same bulk request.

Common Metadata Keys by Event Category

KeyTypeDescription
auth_methodstringAuthentication method used (e.g., "sso")
auth_providerstringIdentity provider type (e.g., "azure_oidc")
KeyTypeDescription
deployment_is_productionbooleanWhether the deployment targets a production environment
revision_numberintegerRevision number of the published config bundle
bundle_hashstringSHA-256 hash of the published config bundle
KeyTypeDescription
invitedUsersarrayList of users being invited, each containing role and email
Example:
{
  "invitedUsers": [
    {
      "role": "member",
      "email": "user@example.com"
    }
  ]
}
KeyTypeDescription
policy_actionstringThe policy action being evaluated (e.g., "deployDeployment", "deleteDeployment")
policy_resourcestringMRN of the resource the policy applies to
required_rolesarrayRoles required to perform the denied action
KeyTypeDescription
identity_fabric_typestringType of identity provider (e.g., "azure_oidc")
KeyTypeDescription
feature_namestringName of the feature flag (e.g., "orchestrator_telemetry")
operation_scopestringScope of the operation (e.g., "global", "account")
confirmation_requiredbooleanWhether the action required explicit confirmation
grace_period_hoursintegerHours before a deletion takes effect (e.g., 24)
can_cancel_untilstring (RFC 3339)Deadline to cancel a pending deletion
role_grantedstringRole granted to a user (e.g., "DSO")
privilege_levelstringLevel of privilege associated with the role (e.g., "elevated")
Metadata keys are not guaranteed to be present on every event. They appear only when relevant to the specific action being recorded.

Event Categories and Types

The Console captures over 75 distinct event types organized into 8 categories. Each event type represents a specific API action.
All operations related to creating, configuring, publishing, and managing Orchestrator deployments.
Event TypeDescription
deployment.listList all deployments
deployment.createCreate a new deployment
deployment.updateUpdate deployment settings
deployment.viewView deployment details
deployment.deleteDelete a deployment
deployment.purgePermanently remove a deleted deployment
deployment.publishPublish a config bundle to the deployment provider
deployment.restoreRestore a previously deleted deployment
deployment.downloadDownload the deployment’s config bundle
deployment.config.viewView deployment configuration
deployment.config.updateUpdate deployment configuration
deployment.config.downloadDownload deployment configuration
deployment.settings.updateUpdate deployment-level settings
deployment.storage.updateUpdate the deployment’s storage provider
deployment.key.downloadDownload the deployment’s public key
deployment.service.createCreate a service extension
deployment.service.viewView a service extension
deployment.service.updateUpdate a service extension
deployment.service.deleteDelete a service extension
deployment.service.jwks.createCreate a JWKS entry for a service
deployment.service.jwks.listList JWKS entries for a service
deployment.service.jwks.deleteDelete a JWKS entry for a service
deployment.application.attachAttach an application to a deployment
deployment.application.detachDetach an application from a deployment
deployment.cache.createCreate a cache configuration
deployment.cache.listList cache configurations
deployment.cache.deleteDelete a cache configuration
deployment.cache.updateUpdate a cache configuration
deployment.cache.viewView a cache configuration
deployment.tls.createCreate a TLS certificate
deployment.tls.listList TLS certificates
deployment.tls.updateUpdate a TLS certificate
deployment.orchestrator.viewView Orchestrator instance details
deployment.revision.listList deployment revisions
deployment.revision.viewView a specific deployment revision
Operations for managing organization settings and configuration.
Event TypeDescription
organization.viewView organization details
organization.updateUpdate organization settings
organization.deleteDelete an organization
Operations for invitations, roles, team membership, and organizational units.
Event TypeDescription
member.listList organization members
member.inviteInvite a new member to the organization
member.removeRemove a member from the organization
member.joinA member accepts an invitation
member.declineA member declines an invitation
member.invitation.cancelCancel a pending invitation
member.role.updateUpdate a member’s role
ownership.transferTransfer organization ownership
organization_unit.createCreate an organizational unit
organization_unit.updateUpdate an organizational unit
organization_unit.listList organizational units
organization_unit.viewView an organizational unit
CRUD operations for applications managed through the Console.
Event TypeDescription
application.listList applications
application.viewView application details
application.createCreate a new application
application.updateUpdate an application
application.deleteDelete an application
Operations for managing identity fabrics and service extensions.
Event TypeDescription
identity_fabric.listList identity fabrics
identity_fabric.createCreate an identity fabric
identity_fabric.viewView identity fabric details
identity_fabric.updateUpdate an identity fabric
identity_fabric.deleteDelete an identity fabric
service_extension.listList service extensions
Operations for managing user flows and their policies.
Event TypeDescription
user_flow.listList user flows
user_flow.createCreate a user flow
user_flow.deleteDelete a user flow
user_flow.viewView user flow details
user_flow.updateUpdate a user flow
user_flow.policy.createCreate a policy on a user flow
user_flow.policy.viewView a user flow policy
user_flow.policy.updateUpdate a user flow policy
user_flow.policy.deleteDelete a user flow policy
TLS certificate management operations.
Event TypeDescription
tls.listList TLS certificates
tls.viewView TLS certificate details
tls.createUpload or create a TLS certificate
tls.updateUpdate a TLS certificate
tls.deleteDelete a TLS certificate
User account operations.
Event TypeDescription
user.deleteDelete a user account

Storage and Retention

Audit log storage is automatic when audit logging is enabled for your organization. There is no additional configuration required. Logs are currently retained indefinitely and are accessible through the Console UI. A formal retention policy, including default retention periods, will be defined in a future release as export and SIEM streaming capabilities become available.

Export and Integration

The following export capabilities are on the Strata product roadmap and are not yet available. Contact your Strata account team for the latest availability.
Planned export and integration capabilities for audit logs include:
  • JSON export — Download audit log data as JSON files for offline analysis and archival
  • CSV export — Export audit logs in CSV format for spreadsheet analysis and reporting
  • SIEM streaming — Stream audit log events to your cloud-based SIEM solution for centralized security monitoring and alerting