-
This is an epic ticket
## About this epic
### Detailed description
Currently within OpenKAT, the "Who did it?" piece is still missing. For example:
- Who added a new user
- Who changed the clearance …
-
VO admins should be able to view an audit trail for each account, showing which significant operations were done on the account, when and by which identity or internal process.
VOMS-Admin exposes a…
-
### Current Behavior
The Vulnerability Audit screen is a useful tool that will usually (or hopefully) lead to a lot of additional audit decisions being made. After a while you might have hundreds (o…
-
#### Current State
The Cloud docs do not currently include a description of events tracked and the audit history available to users.
#### Desired State
https://meshery.layer5.io/events/audit is i…
-
## Problem
The project is currently missing methods to customize the process. Hooks or lifecycle events are needed in order to be able to trigger custom logic before or after changes to the DB.
o…
-
---
Author Name: **Carlos Martín** (Carlos Martín)
Original Redmine Issue: 1615, https://dev.opennebula.org/issues/1615
Original Date: 2012-10-26
---
The big picture:
* Insert each RM request in…
-
To unsure a Chain of Custody for actions performed by a user, we are currently missing:
- the audit trails for performing an operation on an OOI/clearance level
- Which user performed what action at…
-
From feature request:
> "The ability to audit and see who took a PC out of live mode, who moved a PC to a different company, or who made rule changes would be greatly beneficial when tracking down …
-
### Issue description
PROBLEM:
The introduction of the organizational model to the .gov registrar results in new actions, as well as potential modifications to existing actions, which can be taken…
-
Impossible to track down who broke them without audit trail...