Audit Logs
Tracking user actions, filtering by resource and action type, and compliance
Audit logs provide a complete record of every significant action taken in your organization. They help with compliance, troubleshooting, and understanding who did what and when.
Accessing Audit Logs
Navigate to Audit Logs in the sidebar.
- Tenant Admins see audit logs across all accounts in the tenant
- Account Admins see audit logs for their account only
What Gets Logged
Every significant action creates an audit log entry:
User & Member Actions
| Action | Description |
|---|---|
| User created | New user registered or created via invitation |
| User updated | Profile information changed |
| Member added | User added to an account/tenant |
| Member role updated | Membership role changed |
| Member removed | User removed from an account/tenant |
| Invitation created | New invitation sent |
| Invitation accepted | User accepted an invitation |
Process & Job Actions
| Action | Description |
|---|---|
| Process created | New process synced or created |
| Process updated | Process metadata changed |
| Process deleted | Process soft-deleted |
| Job completed | Job reached a terminal status |
| Process member added | User assigned to a process |
| Process member removed | User unassigned from a process |
Settings & Configuration
| Action | Description |
|---|---|
| Settings updated | Tenant or account settings changed |
| API key created | New API key generated |
| API key deactivated | API key revoked |
| License activated | License activated or renewed |
Account Management
| Action | Description |
|---|---|
| Account created | New account added to tenant |
| Account updated | Account information changed |
| Field | Description |
| When the action occurred | |
| Which user performed the action (email/name) | |
| What was done (create, update, delete, assign, etc.) | |
| What type of entity was affected (user, process, job, etc.) | |
| The ID of the affected entity | |
| Additional context (JSON) — what changed, old/new values | |
| Which account the action occurred in | |
| Which tenant |
Filtering Audit Logs
Use the filters to find specific entries:
- Action type — Create, Update, Delete, Assign, etc.
- Resource type — User, Process, Job, Settings, API Key, etc.
- Date range — Filter by time period
- User — Filter by who performed the action
Use Cases
Compliance
Audit logs provide evidence of:
- Who accessed what data and when
- When and by whom settings were changed
- Member access changes (additions, removals, role changes)
- API key lifecycle (creation, deactivation)
Troubleshooting
When something goes wrong, audit logs help answer:
- "Who changed the RPA credentials?" — Filter by resource type: Settings
- "When was this user removed?" — Filter by action: Member removed
- "Who created this API key?" — Filter by resource type: API Key
Security
Monitor for suspicious activity:
- Unusual member additions or role escalations
- API key creation from unexpected users
- Settings changes outside business hours
- Mass deletions or modifications
Data Retention
Audit logs are retained for the lifetime of the tenant. They are not automatically purged, ensuring a complete historical record.
Scope-Based Visibility
Audit logs respect the same scope rules as other data:
- Account Admins see only actions within their account
- Tenant Admins see actions across all accounts
- Actions are tagged with both tenant_id and account_id for proper scoping