Events done on the security configuration are logged in the security history. So, you can monitor the changes to the security configuration.
These events are logged:
- Audit log initialized
- Duty created
- Duty deleted
- Duty modified
- Objects published
- Privilege created
- Privilege deleted
- Privilege modified
- Role assigned
- Role assigned dynamically
- Role created
- Role deleted
- Role locked
- Role merged
- Role modified
- Role removed
- Role removed dynamically
- Role unlocked
- Security configuration exported
- Security configuration imported
- SoD conflict allowed
- SoD conflict denied
- SoD rule created
- SoD rule deleted
- SoD rule modified
- SoD rules validated
- Stand-in role assigned
- Stand-in role removed
- Stand-in rule conflict
- Stand-in rule created
- Stand-in rule deleted
- Stand-in rules applied
- User created
- User deleted
- User disabled
- User enabled
- User modified
Standard procedure
1. |
Click Security management. |
2. |
Click the History tab. |