Configuration Auditing

When we are managing API Access Control resource servers, resources, or resource access policies there are a number of IBM Security Verify Access operations performed internally.

A log file is used to audit the type of operation and who it was performed by. This file is located in the application log files directory /isam_runtime/policy_server/api_access_control.log. The following is an example of a log entry. It shows:

Parent topic: Overview of the API Access Control