Single Sign-On (SSO) audit events are records of user or system actions for accessing the SSO services.
- Login and Logout Attempts: Events for all the successful and failed login and logout operations.
- Privilege Change: Event for change in a user role or permissions.
- Account Change: Event for change in the user account information, for example, user name, password, or any additional account information.
- Security Change: Event for change in a security configuration, parameter, or policy.
- Account Enabled or Disabled: Event for when an account is enabled or disabled.
- Identity Source: Event for adding, deleting, or editing an identity source.
In the vSphere Client, event data is displayed in the Monitor tab. See the vSphere Monitoring and Performance documentation.
SSO audit event data includes the following details:
- Timestamp of when the event occurred.
- User who performed the action.
- Description of the event.
- Severity of the event.
- IP address of client used to connect to vCenter Server, if available.
SSO Audit Event Log Overview
The vSphere Single-Sign On process writes audit events to the audit_events.log file in the /var/log/audit/sso-events/ directory.
Keep the following in mind when working with the audit_events.log file:
- The log file is archived once it reaches 50 MB.
- A maximum of 10 archive files is kept. If the limit is reached, the oldest file is purged when a new archive is created.
- The archive files are named audit_events-<index>.log.gz, where the index is a numeral from 1 to 10. The first archive created is index 1, and is increased with each subsequent archive.
- The oldest events are in archive index 1. The highest indexed file is the latest archive.