Skip to main content
Version: 3.25

Access control history

It is necessary to control the access to the security system like senhasegura to prevent unauthorized access to privileged credentials, assets and more that are stored on the system.

In this section, you can print log reports of the users and group activities conducted trough senhasegura with information such as date of the activity, credential and user accessed and more. Accessing the menu Reports ➔ Access control you will see the following reports:

Access control logs

This report shows the access control history of the activities made by each system users and the approvals requirements when needed. This report is important to understand if the privileges of each user still in compliance with the access flow set by the company's policy also if the users need approval or not to execute activities.

The Access control logs report will print the following information:

  • Date: day and time the changed was performed;

  • Operation: performed by the user;

  • User: is the name of the user that will be detailed;

  • IP: of device the user performed the operation;

  • Credential type: of the password which was accessed ;

  • Device: that was accessed;

  • Username: that was accessed;

  • Reason: is the type of justification the user gives to access the credential;

  • Governance ID: it is the code used to track the access in senhasegura ;

  • Reason: is the justification text the user gives to perform the view;

  • Message: is what the system print to the requester related to the permissions and more;

  • Origin: indicate the platform used to access;

It's also possible to see more details about the access clicking on the action icon of the register.

Access group logs

This report shows the access logs through the access group perspective with logs of the group modifications made by each system users such as group creation, user removal and more. This report is important to understand if the privileges of each user still in compliance with the access flow set by the company's policy also if the users need approval or not to execute activities. As well input the non-repudiation, proving that the user's username was the one who performed the modification.

The Access group logs report will print the following information:

  • Date: the group was modified;

  • Operation: the user performed on the group;

  • User: is the name of the user that performed the modification;

  • Group: that was modified;

  • User group: is the name of the user that admitted the modification;

  • Message: is what the system print after the modification;

It's also possible to see more details about the access clicking on the action icon of the register. % Redefinindo a pasta atual do capitulo