Ingest and export Audit Log Events from your application.
Audit Logs are a collection of events that contain information relevant to notable actions taken by users in your application. Every event in the collection contains details regarding what kind of action was taken (
action), who performed the action (
actor), what resources were affected by the action (
targets), and additional details of when and where the action took place.
These events are similar to application logs and analytic events, but are fundamentally different in their intent. They aren’t typically used for active monitoring/alerting, rather they exist as a paper trail of potentially sensitive actions taken by members of an organization for compliance and security reasons.
This guide will show you how to:
To get the most out of this guide, you’ll need:
WorkOS offers native SDKs in several popular programming languages. Choose a language below to see instructions in your application’s language.
Don't see an SDK you need? Contact us to request an SDK!
As a best practice, your WorkOS API key should be kept secret and set as an environment variable on process start. The SDK is able to read the key automatically if you store it in an environment variable named WORKOS_API_KEY; otherwise, you will need to set it manually. The Client ID should also be set dynamically based on the release environment.
Before you can emit any Audit Log Events you must configure the allowed event schemas. To start, click “Create an event” and enter
user.signed_in for action,
team for targets, and click “Save event”.
All events are scoped to an Organization, so you will need the ID of an Organziation in order to emit events.
Using the ID from the Organization, emit an Audit Log Event with the
targets previously configured.