Uploaded image for project: 'Atlassian Guard'
  1. Atlassian Guard
  2. ACCESS-1133

Better audit logging for SCIM provisioning events.

    • Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

      At the moment, some provisioning activities are logged in the Organization Audit logs but they are not very descriptive. 

      ie. Changing the account details and deactivating an account in the IDP is logged as the same activity in Audit log. 

       

      Identity Provider  Updated account profile for email@domain.com
      Identity Provider  Updated account profile for email@domain.com

       

      Suggestion 

      Provide more details on audit logs based on user provisioning

      • Specify that provisioning is the actor. 
      • Log specific user account changes.
      • Log specific group changes.

       

      Suggestion 

            [ACCESS-1133] Better audit logging for SCIM provisioning events.

            Kat N added a comment -

            Thanks everyone for watching and commenting on this ticket. As part of an initiative to better consolidate customer feedback, we are closing this ticket as a duplicate. Please vote, watch and comment on ACCESS-1148 going forward.

            Kat N added a comment - Thanks everyone for watching and commenting on this ticket. As part of an initiative to better consolidate customer feedback, we are closing this ticket as a duplicate. Please vote, watch and comment on ACCESS-1148 going forward.

              jyu@atlassian.com Jonathon Yu
              rmacalinao Ramon M
              Votes:
              1 Vote for this issue
              Watchers:
              7 Start watching this issue

                Created:
                Updated:
                Resolved: