Update

UpdateAuthenticationConnection


Whenever an Authentication Connection is updated, whether it be through Identify*Admin or Identify*Services, the update will be registered under the UpdateAuthenticationConnection event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateAuthenticationConnection”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the update was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditAuthenticationConnection].[EntityId] All authentication connection records are identified by a unique identifier. This column registers this unique identifier in order to identify the specific authentication connection that the event in question occurred to.
[AuditAuthenticationConnection].[Name] Stores the name given to the connection in Identify.
[AuditAuthenticationConnection].[Description] If a description exists for the Authentication Connection record, it will be stored in this column.
[AuditAuthenticationConnection].[Enabled] Saves information on whether the Authentication Connection is enabled or disabled.
[AuditAuthenticationConnection].[ConfigurationClrType] The Common Language Runtime reference for the Authentication Connection object.
[AuditAuthenticationConnection].[ConfigurationXml] Stores the configuration of the Authentication Connection’s various settings in XML.
[AuditAuthenticationConnection].[PlugInDescription] A description of the Plugin that was chosen for the Authentication Connection.
[AuditAuthenticationConnection].[PlugInName] The name of the PlugIn used for the Authentication Connection. Currently possible PlugIns are:·         WS-Federation login

·         SAML/[glossary] 2.0 SignOn plugin

·         Username & password Login plugin

·         [glossary]OCES login

·         NemID login

[AuditAuthenticationConnection].[PlugInClrType] The Common Language Runtime reference for the Plugin object used for this connection.
[AuditAuthenticationConnection].[PlugInEnabled] Whether or not the Plugin is enabled. This will most likely always be 1 (true), since it would not be possible to update a disabled plugin.
[AuditAuthenticationConnection].[PlugInType] Will always be “Authentication”

UpdateClaimDefinition


Whenever a Claim is updated, whether it be through Identify*Admin or Identify*Services, the update will be registered under the UpdateClaimDefinition event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateClaimDefinition”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the update was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditClaimDefinition].[EntityId] All claim records are identified by a unique identifier. This column registers this unique identifier in order to identify the specific claim that the event in question occurred to.
[AuditClaimDefinition].[ClaimType] Registers the claim type name that is given to the claim.
[AuditClaimDefinition].[FriendlyName] Register the friendly name that is given to the claim.
[AuditClaimDefinition].[Description] If a description exists for the Claim record, it will be stored in this column.
[AuditClaimDefinition].[CountSpecification] CountSpecification is used to decide how many values of a specific claim type are allowed for a user. The ‘Free’ value means that the user can have any number of claims for such a claim type in the token issued for the user at login.

UpdateIdentityProviderConfiguration


Whenever an Identity Provider Configuration is updated, whether it be through Identify*Admin or Identify*Services, the update will be registered under the UpdateIdentityProviderConfiguration event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateIdentityProviderConfiguration”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the update was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditIdentityProviderConfiguration].[EntityId] All user records are identified by a unique identifier. This column registers this unique identifier in order to identify the specific user that the event in question occurred to.
[AuditIdentityProviderConfiguration].[Description] If a description exists for the Identity Provider Configuration record, it will be stored in this column.
[AuditIdentityProviderConfiguration].[ClrType] The Common Language Runtime reference for the Identify Provider Configuration object.
[AuditIdentityProviderConfiguration].[Xml] Stores the configuration of the Identity Provider’s various settings in XML.

UpdateOrganization


Whenever an Organization is updated, whether it be through Identify*Admin or Identify*Services, the update will be registered under the UpdateOrganization event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateOrganization”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the update was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditOrganization].[OrganizationId] All organizations are identified by a unique identifier. This column registers this unique identifier in order to identify the specific organization that the event in question occurred to.
[AuditOrganization].[Name] Stores the name of the organization.
[AuditOrganization].[ParentId] Stores the parent organization’s unique identifier.

UpdateProtocolConnection


Whenever a Protocol Connection is updated, whether it be through Identify*Admin or Identify*Services, the update will be registered under the UpdateProtocolConnection event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateProtocolConnection”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the update was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditProtocolConnection].[EntityId] All protocol connection records are identified by a unique identifier. This column registers this unique identifier in order to identify the specific protocol connection that the event in question occurred to.
[AuditProtocolConnection].[UsePersistentPseudonym] Whether or not the Protocol Connection is to use Persistent Pseudonyms with other SPs/IdPs in the federation.
[AuditProtocolConnection].[Name] Stores the name given to the connection in Identify.
[AuditProtocolConnection].[Description] If a description exists for the Protocol Connection record, it will be stored in this column.
[AuditProtocolConnection].[Enabled] Saves information on whether the Protocol Connection is enabled or disabled.
[AuditProtocolConnection].[ConfigurationClrType] The Common Language Runtime reference for the Identify Protocol Connection object.
[AuditProtocolConnection].[ConfigurationXml] Stores the configuration of the Protocol Connection’s various settings in XML.
[AuditProtocolConnection].[PlugInDescription] A description of the Plugin that was chosen for the Protocol Connection.
[AuditProtocolConnection].[PlugInName] The name of the PlugIn used for the Protocol Connection. Currently possible Plugins are:·         WS-Federation protocol plug-in·         SAML 2.0 protocol plug-in
[AuditProtocolConnection].[PlugInClrType] The Common Language Runtime reference for the Plugin object used for this connection.
[AuditProtocolConnection].[PlugInEnabled] Whether or not the Plugin is enabled. This will most likely always be 1 (true), since it would not be possible to update a disabled plugin.
[AuditProtocolConnection].[PlugInType] Will always be “Protocol”

UpdateUser


Whenever a User is updated, whether it be through Identify*Admin or Identify*Services, the update will be registered under the UpdateUser event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateUser”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the update was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditUser].[EntityId] All user records are identified by a unique identifier. This column registers this unique identifier in order to identify the specific user that the event in question occurred to.
[AuditUser].[UserName] Saves the Identify name of the user being updated ([User].[UserName]).
[AuditUser].[Enabled] Saves information on whether the user is disabled or enabled.

UpdateLdapAttributeDefinition


Whenever a LDAP attribute definition is updated, whether it be through Identify*Admin or Identify*Services, the insertion will be registered under the UpdateLdapAttributeDefinition event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateLdapAttributeDefinition”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the insert was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditLdapAttributeDefinition].[EntityId] All user records are identified by a unique identifier. This column registers this unique identifier in order to identify the specific ldap attribute that the event in question occurred to.
[AuditLdapAttributeDefinition].[UserName] Registers the LDAP attribute definition ‘s name that is given to the LDAP attribute definition.
[AuditLdapAttributeDefinition].[DisplayName] Registers the LDAP attribute definition ‘s display name that is given to the LDAP attribute definition.

UpdateClaimSet


Whenever a Claim is updated, whether it be through Identify*Admin or Identify*Services, the update will be registered under the UpdateClaimSet event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateClaimSet”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the insert was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditClaimSet].[EntityId] All claim set records are identified by a unique identifier. This column registers this unique identifier in order to identify the specific claim set that the event in question occurred to.
[AuditClaimSet].[Name] Registers the claim set name that is given to the claim set.
[AuditClaimSet].[Headline] Registers the claim setheadline that is given to the claim set.
[AuditClaimSet].[Description] Registers the claim setdescription that is given to the claim set.
[AuditClaimSet].[Required] Registers the required status that is given to the claim set.
[AuditClaimSet].[AccessOrganizationId] Registers the parentorganization of the claim set.
[AuditClaimDefinition].[ClaimTypes] Registers the claim types that are given to the claim set.

UpdateOAuthAccessToken


Whenever anOauth Access Token is updated, the update will be registered under the UpdateOAuthAccessToken event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateOAuthAccessToken”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the insert was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditClaimSet].[EntityId] All claim set records are identified by a unique identifier. This column registers this unique identifier in order to identify the specific claim set that the event in question occurred to.
[AuditOAuthAccessToken].[Code] Registers the code that is given to the OAuth access token.
[AuditOAuthAccessToken].[HashedCode] Registers the hash code that is given to the OAuth access token.
[AuditOAuthAccessToken].[ClientIdentifier] Registers the client Id that is given to the OAuth access token.
[AuditOAuthAccessToken].[Scope] Registers the scope that is given to the OAuth access token.
[AuditOAuthAccessToken].[Type] Registers thetypeof the OAuth access token.
[AuditOAuthAccessToken].[UserName] Registers the user name that is given to the OAuth access token.
[AuditOAuthAccessToken].[AuthenticationConnectionId] Registers theauthentication id that is given to the OAuth access token.
[AuditOAuthAccessToken].[UserId] Registers the user ID that is given to the OAuth access token.
[AuditOAuthAccessToken].[CreationDate] Registers the created date of the OAuth access token.
[AuditOAuthAccessToken].[ExpirationDate] Registers the expired date of the OAuth access token.
[AuditOAuthAccessToken].[AllowRefreshToken] Registers the RefreshToken status that is given to the OAuth access token.
[AuditOAuthAccessToken].[RefreshTokenExpirationDate] Registers the refreshed date of the OAuth access token.
[AuditOAuthAccessToken].[ProtocolConnectionId] Registers the protocol id that is given to the OAuth access token.
[AuditOAuthAccessToken].[SerializedClaimsPrincipal] Registers the claim princial of the OAuth access token.
[AuditOAuthAccessToken].[UserInfoSessionId] Registers the user info session id of the OAuth access token.

UpdateAuthenticationContextMethodClass


Whenever an authentication context class method class is inserted, the insertion will be registered under the UpdateAuthenticationContextMethodClass event type.

[Table].[Column] storing log information Description of information stored
[AuditEvent].[EventType] Event is identified by value in this column being “UpdateAuthenticationContextMethodClass”
[AuditEvent].[UTCTimestamp] Specifies the date and time in UTC that the event occurred.
[AuditEvent].[UserName] If this action is carried out via a federated user, his unique identity bearing claim will be saved into the username column. The federated user may or may not exist in the Identify database; he will still be registered.
[AuditEvent].[ApplicationId] Stores the name of the Relying Party from where the insert was made. This will either be Identify*Admin site or the Identify*Service site.
[AuditClaimSet].[EntityId] All authentication context class method records are identified by a unique identifier. This column registers this unique identifier in order to identify the specific authentication context class method that the event in question occurred to.
[AuditClaimSet].[MethodClass] Registers the name that is given to the authentication context class method.
[AuditClaimSet].[ComparableValue] Registers the integer value that is given to the the authentication context class method.
Was this helpful ?Good Somewhat Bad