Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The Administration panel now reports specific actions that

...

manage security permissions for users

...

.

...

Each entry row will

...

consist of the following columns:

  • Operation type

...

  • : name of the operation performed

...

  • Administrator Full Name

...

  • : full name of admin user who performed the given action

...

  • User Full Name

...

  • : full name of the user that the action affects

...

  • Description

...

  • : text description of what has been changed for the given user

  • Date and Time

...

  • : date and time when the change

...

  • was made

Each row is also expandable, showing additional information about activity:

...

  • Administration username and email that performed the action

...

...

  • Username and email of the user that the action affects

...

  • Country, Region, and IP

...

  • : GeoIP information if possible of administrator who performed action

  • User Agent

...

  • : additional info

...

  • on Administrator system.

...

Image Added


List of user activities that will be reported in Administrative Activity tab:

1

changed user name

2

changed user full name

3

changed user description

4

changed user email

5

changed user provider

6

enabled user

7

disabled user

8

deleted user

9

assigned user to group

10

removed user from group

11

assigned user to role

12

removed user from role

13

assigned user to permission in security scheme

14

unassigned user from permission in security scheme

15

assigned user to FLS

16

unassigned user from FLS

17

added user

Administrator using the Activity log can narrow down the list of activities by selecting

...

a specific user. The list will display actions related to the selected user.

Some additional features that will be implemented

...

in the next version include:

  • Handling groups

...

...

  • Additional filtering

...

  • options (by date and operation type)

...

...

  • Retention policy

...

...

  • Possibly adding new operation types if needed.