Security Log

Location: Settings > Logs > Security Log

The security log is an aid for the main user of the system. Successful and unsuccessful logons in the system as well as the reason for unsuccessful logon and log out information are entered in the Security log. The user can access the security log if the setting Security Log is allowed for his/her username in the Users function. For more information, see Users.

You can limit transactions that are shown in the security log by date range, user name, transaction type and status. The Transaction setting and Status setting are saved as the user's default values for the next time. The current day is always applied as the default limiting factor for date ranges. Username is always empty by default.

Information Displayed in the Security log:

  • Number: Sequential numeric information. The number sequence is continuous.
  • Time: Transaction timestamp.
  • User name: User name used for logging in.
  • User: The user name, provided that the user has been identified.
  • IP Address: The IP address used for logging in/attempting to log in.
  • Transaction:
    • Login = With username and password
    • Login (domain) = Domain specific login
    • Login OAI = Logging in with a username and password via the Open Archive Interface (OAI).
    • Login OAI (domain) = Domain specific logging in with a username and password via the Open Archive Interface (OAI).
    • Mobile Login = Logging into the mobile interface with a username and password.
    • Changing password = A password change performed via the login page Forgot your password? function.
    • Logout = Logging out of the system either by clicking Log out or due to time-out. Time-outs are recorded in the Status column.
  • Status: Log status.