Skip to main content


Identity Cloud creates log events that you can view and analyze for your business needs. There are three different actor types that can initiate a log event:

  • User: Interactions of your users with Identity Cloud. For example, authentications done by your users.
  • Admin: Configuration changes made by your administrators in the Identity Cloud management console.
  • API: Operations performed using the Identity Cloud API.

Log events are retained for 90 days. You can export log events if you want to keep log events beyond the retention period.


The log events is an incubating feature. Currently, not all interactions are already covered by log events. See the list of events for additional information.

List of log entries

Search and Filter

You can filter logs based on status (successful or failed), and based on a timeframe.

List of log entries

You can also do a free-text search based on any entry element. You can combine filters and free-text search.

List of log entries

Detailed log entries

If you click an entry in the list view, you can get to the detailed view of the entry. The body of the log is shown as a JSON object, while the sidebar displays meta information about the event, such as the date, the device used, and by which actor the log is initiated.

Click the copy icon to grab the contents of the entry.

Detailed information of a log event

Exporting log entries

You can export all or the filtered log entries from the list view, if you select an export menu item from the more options menu ︙ in the top right corner. Exporting filtered entries can help with troubleshooting issues by inspecting related events, while exporting all the logs may support archival record keeping.

The exported records are in CSV format.

List of log entries