Audit Logs

Tracking user actions, filtering by resource and action type, and compliance

Audit logs provide a complete record of every significant action taken in your organization. They help with compliance, troubleshooting, and understanding who did what and when.

Accessing Audit Logs

Navigate to Audit Logs in the sidebar.

- Tenant Admins see audit logs across all accounts in the tenant

- Account Admins see audit logs for their account only

What Gets Logged

Every significant action creates an audit log entry:

User & Member Actions

ActionDescription
User createdNew user registered or created via invitation
User updatedProfile information changed
Member addedUser added to an account/tenant
Member role updatedMembership role changed
Member removedUser removed from an account/tenant
Invitation createdNew invitation sent
Invitation acceptedUser accepted an invitation

Process & Job Actions

ActionDescription
Process createdNew process synced or created
Process updatedProcess metadata changed
Process deletedProcess soft-deleted
Job completedJob reached a terminal status
Process member addedUser assigned to a process
Process member removedUser unassigned from a process

Settings & Configuration

ActionDescription
Settings updatedTenant or account settings changed
API key createdNew API key generated
API key deactivatedAPI key revoked
License activatedLicense activated or renewed

Account Management

ActionDescription
Account createdNew account added to tenant
Account updatedAccount information changed
FieldDescription
When the action occurred
Which user performed the action (email/name)
What was done (create, update, delete, assign, etc.)
What type of entity was affected (user, process, job, etc.)
The ID of the affected entity
Additional context (JSON) — what changed, old/new values
Which account the action occurred in
Which tenant

Filtering Audit Logs

Use the filters to find specific entries:

- Action type — Create, Update, Delete, Assign, etc.

- Resource type — User, Process, Job, Settings, API Key, etc.

- Date range — Filter by time period

- User — Filter by who performed the action

Use Cases

Compliance

Audit logs provide evidence of:

- Who accessed what data and when

- When and by whom settings were changed

- Member access changes (additions, removals, role changes)

- API key lifecycle (creation, deactivation)

Troubleshooting

When something goes wrong, audit logs help answer:

- "Who changed the RPA credentials?" — Filter by resource type: Settings

- "When was this user removed?" — Filter by action: Member removed

- "Who created this API key?" — Filter by resource type: API Key

Security

Monitor for suspicious activity:

- Unusual member additions or role escalations

- API key creation from unexpected users

- Settings changes outside business hours

- Mass deletions or modifications

Data Retention

Audit logs are retained for the lifetime of the tenant. They are not automatically purged, ensuring a complete historical record.

Scope-Based Visibility

Audit logs respect the same scope rules as other data:

- Account Admins see only actions within their account

- Tenant Admins see actions across all accounts

- Actions are tagged with both tenant_id and account_id for proper scoping