Audit event reference

This topic provides a detailed description of the events generated by the Conjur audit service.

 

Unauthenticated requests to endpoints that require authentication do not generate an audit event.

Login

A Login event is generated when logging in with a username and password using HTTP basic authentication to retrieve an API key.

API endpoint

  • Login - GET /authn/{account}/login

Structured data

Data Element

Values

action@43868

operation: set to login

result: set to success or failure

auth@43868

authenticator: the type of authenticator used (authn-k8s or authn-ldap).

service: the service ID of the authenticator (aconjur/authn-k8s/my-k8s-authn).

user: the fully-qualified policy ID of the role attempting to log in. If the user does not exist, this field displays not-found.

subject@43868

role: the fully-qualified policy ID of the role attempting to log in.

Authenticate

An Authenticate event is generated when:

  • A user or host authenticates to retrieve a short-lived access token (with an API key or OIDC).

  • A Kubernetes authenticator injects a client certificate into a Pod.

  • An authentication request is made with invalid credentials.

API endpoints

The Conjur audit service supports all authentication methods. Authentication requests typically append /authenticate to the server URL, as shown in the following examples:

  • Authenticate - POST /authn/{account}/{login}/authenticate

  • OIDC Authenticator - POST /authn-oidc/{service-id}/{account}/authenticate

  • Azure Authenticator - POST https://<-server-hostname>/authn-azure/<service-id>/<account>/<host-id>/authenticate

  • GCP Authenticator - POST https://<-server-hostname>/authn-gcp/<account>/authenticate

Structured data

Data Element

Values

action@43868

operation: is set to one of the following:

  • authenticate

  • k8s-inject-client-cert

result: set to success or failure

auth@43868

authenticator: the type of authenticator used (authn-k8s or authn-ldap).

service: the service ID of the authenticator (aconjur/authn-k8s/my-k8s-authn).

user: the fully-qualified policy ID of the role attempting to authenticate. If the user does not exist, this field displays not-found.

subject@43868

role: the fully-qualified policy ID of the role attempting to authenticate.

Validate authenticator status

A Validate Authenticator Status event is generated when a user or host queries an authenticator for its availability status.

API endpoint

Structured data

Data Element

Values

action@43868

operation: set to validate-status

result: set to success or failure

auth@43868

authenticator: the type of authenticator used (authn-k8s or authn-ldap).

service: the service ID of the authenticator (aconjur/authn-k8s/my-k8s-authn).

subject@43868

role: the fully-qualified policy ID of the role attempting to validate status.

Change password

A Change Password event is generated when a user changes or attempts to change their password.

API endpoint

Structured data

Data Element

Values

action@43868

operation: set to change

result: set to success or failure

auth@43868

user: the fully qualified policy ID for the authenticated role.

subject@43868

role: the fully-qualified policy ID for the role being updated.

Rotate API key

A Rotate API Key event is generated when a role rotates its own API key, or a user rotates the API key for another role.

API endpoints

Structured data

Data Element

Values

action@43868

operation: set to rotate

result: set to success or failure

auth@43868

user: the fully qualified policy ID for the authenticated role.

subject@43868

role: the fully-qualified policy ID for the role being updated.

Check permission

A Check Permission event is generated when a request is made to check whether a policy role can perform some action (read, execute, etc.) on a policy resource.

API endpoints

  • Check permission - GET /resources/{account}/{kind}/{identifier}?check=true&role={role}&privilege={privilege}

Structured data

Data Element

Values

action@43868

operation: set to check

result: set to success or failure

auth@43868

NA

subject@43868

role: the fully-qualified policy ID of the role whose permissions are being checked.

resource: the fully-qualified policy ID of the resource whose permissions are being checked.

privilege: an action word describing the privilege that is being checked.

Policy add

A Policy Add event is generated when a policy is loaded for each new resource that is created.

API endpoints

Structured data

Data Element

Values

action@43868

operation: set to add

result: set to success or failure

auth@43868

user: the fully qualified policy ID for the authenticated role.

policy@43868

id: the fully qualified policy ID for the policy add event.

version: the version in which this policy was added.

subject@43868

(see Policy event subjects)

Policy remove

A Policy Remove event is generated when a policy is loaded for each deleted resource. The policy must be loaded through the "Replace" (PUT) or "Update" (PATCH) API endpoints because the "Append" (POST) endpoint does not allow resources to be deleted.

API endpoints

Structured data

Data Element

Values

action@43868

operation: set to remove

result: set to success or failure

auth@43868

user: the fully qualified policy ID for the authenticated role.

policy@43868

id: the fully qualified policy ID for the policy remove event.

version: the version in which this policy was removed.

subject@43868

(see Policy event subjects)

Policy change

A Policy Change event is generated for each updated resource. The policy must be loaded through the "Replace" (PUT) or "Update" (PATCH) API endpoints because the "Append" (POST) endpoint does not allow resource modification.

API endpoints

Structured data

Data Element

Values

action@43868

operation: set to change

result: set to success or failure

auth@43868

user: the fully qualified policy ID for the authenticated role.

policy@43868

id: the fully qualified policy ID for the policy change event.

version: the version in which this policy was changed.

subject@43868

(see Policy event subjects)

Set secret value

A Set Secret Value event is generated when a request is made to set a secret value.

API endpoints

  • Set a Secret - POST /secrets/{account}/{kind}/{identifier}

Structured data

Data Element

Values

action@43868

operation: set to update

result: set to success or failure

auth@43868

user: the fully qualified policy ID for the authenticated role.

subject@43868

resource: the fully-qualified resource ID of the secret being set.

Fetch secret value

A Fetch Secret Value event is generated when a request is made to read a secret value.

API endpoints

Structured data

Data Element

Values

action@43868

operation: set to fetch

result: set to success or failure

auth@43868

user: the fully qualified policy ID for the authenticated role.

subject@43868

resource: the fully-qualified resource ID of the secret being read.

Policy event subjects

The subject@43868 structured data field of policy events can contain a wide range of values, depending on the type of policy object that is the target of the policy-loading operation. This section describes the contents of this field for various policy objects.

Field

Values

Annotations

  • annotation: the name of the annotation being updated.

  • resource: the fully-qualified policy ID of the resource to which the annotation applies.

Permissions

  • resource: the fully-qualified policy ID of the resource whose permission is being updated.

  • role: the fully-qualified policy ID of the role whose access to a resource is being updated.

  • privilege: an action word indicating the privilege that is being updated.

Resources

  • resource: the fully-qualified policy ID of the resource being updated.

Roles

  • role: the fully-qualified policy ID of the role that is being updated.

Role Membership

  • role: the fully-qualified policy ID of the role whose members are being updated.

  • owner / member: the fully-qualified policy ID of the role who is becoming an owner or member of a group.

High availability

In high-availability configurations, audit events are created by Masters and Followers. Standbys do not serve traffic, unless they are promoted to Leader, so they do not produce audit events.

The Leader can produce every type of audit event. Followers have a read-only database so they are only be able to produce audit events associated with read-only operations, which can be viewed only from the Conjur UI.

To determine whether a read-only audit event originated from the Leader or a Follower, examine the hostname field in the Syslog Protocol formatted audit message.