It should be logged. Search for IMPERSONATE in your log file.
On 1/13/2016 3:13 PM, Rajees Patel wrote:
Hi,
For auditing reasons we have a requirement that all user actions are
logged.
If user X is impersonating user Y, is it possible that this be logged
somewhere? i.e
13 Jan 2016 16:47:56 INFO User X is impersonating User Y
We are concerned that user X may impersonate user Y and perform some
malicious actions, and we will have no idea that this happened.
Regards
Raj
Rajees Patel
Product Architect
Invenco Group Limited
O: +64 9 905 5673
Rajees.Patel(a)invenco.com <mailto:Rajees.Patel@invenco.com>
*www.invenco.com <
http://www.invenco.com>*
*Disclaimer: This email is confidential and may be legally
privileged. If you are not the intended recipient you must not use
any of the information in it and must delete the email immediately.*
_______________________________________________
keycloak-user mailing list
keycloak-user(a)lists.jboss.org
https://lists.jboss.org/mailman/listinfo/keycloak-user
--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com