Security log (access.log)

The security log contains information about authentication requests, also called attempts.

The security log is turned on by default. We can configure:

To configure the security log, do these steps:

  1. Log on to the IBM Security Identity Manager virtual appliance console.

  2. From the top-level menu of the Appliance Dashboard, select Manage > Maintenance > Log Retrieval and Configuration.

  3. On the Log Retrieval and Configuration page, select the Identity tab.

  4. Select Application access.

  5. Click Configure. For more information, see Manage the log configuration.

For information about configuring the size and contents of the security log, see IBM Security Identity Manager logging properties.

Parent topic: IBM Security Identity Manager operational logs