Przejdź do głównej zawartości
Wersja: 17.2

Audit Log Files

ADONIS automatically tracks administrative actions, such as

  • creating and deleting users,

  • changing access rights and

  • importing and exporting repository data.

Wskazówka

For a complete list of logged actions, please refer to the chapter Audit Log - Logged Actions.

Audit entries are written to *_audit.log files in the default /logs folder of the application server installation directory. This functionality is always active and cannot be disabled.

How Audit Data Is Written

The following rules apply to audit data logging:

  • Actions are logged immediately upon execution, not after database commit. This ensures that attempted actions are recorded, along with their commit status (successful or aborted).

  • Strings in log entries are written in the primary language of the application library. If the primary language is not available, fallback rules apply. If no library is available yet (for example during database creation), strings are written in English.

  • By default, sensitive data (such as user names and user properties) is encrypted in the audit logs.

Info

In addition to the audit log files described here, ADONIS also provides an audit log that can be enabled manually in the ADONIS Administration and exported as CSV. For details, see Audit Log.

Log File Location and Naming

Audit log files are placed in the same /logs folder as other application server log files. The naming convention is:

<DATE>_<TIME>_<PROCESS_ID>_audit.log

Example

2025.09.16_11.53.57_86752_audit.log

Audit log files are also included automatically in the support information package (SIP).

Deanonymise Audit Data

If required, sensitive data can be written in plain text instead of being encrypted. To enable this, you need to modify a configuration file:

  1. Navigate to the directory <ADONIS application server>/conf.

  2. Open the file server.conf in a text editor with administrative privileges.

  3. Find the parameter ADOXX_SECURITY_DISABLE_SENSITIVE_DATA_ENCRYPTION.

  4. Remove the leading # to uncomment the line.

  5. Save the changes and restart the ADONIS application server to apply the modifications.

Uwaga

Use with caution. Enabling this option will store sensitive personal data in plain text within audit logs. This may violate internal security policies or external compliance obligations, including GDPR. Ensure that appropriate safeguards, access controls, and retention policies are in place.