Tracing Permission Changes

What is it? 

As an application owner, understanding changes to the permission scheme, role configuration, and role assignment over time is beneficial to keep control of who is allowed to do what in your application.

Via system logs, your application provides you with the option to easily trace such changes.

How does it work?

The logs to the permission scheme, role configuration, and role assignment changes can be accessed via the Settings Wheel > System Administration > System Logs.

The Logs on permission scheme changes

Changes in the permission configuration are logged in the following format:

  • Who (user) has changed the configuration?
  • Where (location) was the configuration changed?
  • Which (permission) was changed?
  • Which user role is affected by that change?
  • To which state was the permission changed?
  • When was the change?

system_logs.png

The logs on role configuration changes

Changes in the role configuration are logged in the following format:

  • Which role was edited?
  • What was done?
  • When was the change?

system_logs_2.png

The logs on user role changes

Changes in the user role assignment are logged in the following format:

  • Who (user) has changed the configuration?
  • Which user was affected by the change?
  • Which role(s) has been assigned to the users before the change?
  • Which role(s) has been assigned to the users after the change?
  • When was the change?

system_logs_3.png

Was this article helpful?
1 out of 1 found this helpful