Skip to main content

Request Log

The Request Log is a complete audit trail of all access governance events in your organization. Every action taken through the IGA system — from initial access requests to final provisioning or denial — is recorded here.

When to Use the Request Log

  • Auditing who requested what and when, for compliance reporting
  • Investigating why a particular access request was approved or denied
  • Tracking the lifecycle of a specific request from creation to completion
  • Reviewing patterns in access requests to improve your approval workflows

Understanding Events

Each entry in the log represents a single event in the lifecycle of an access request. Common event types include:

Event TypeDescription
CreatedA new access request was submitted
ApprovedAn approver approved the request
DeniedAn approver denied the request
ProvisionedAccess was granted to the user (group membership added)
DeprovisionedAccess was removed (group membership removed after expiration)
CancelledThe request was cancelled before completion
ExpiredA time-limited access grant reached its end date

Filtering the Log

Use the filter options to narrow down results:

  • Request ID — Find all events related to a specific request
  • Event Type — Show only approvals, denials, or other specific events
  • Service — Filter by the service or resource that was requested
  • Workflow — Filter by the approval workflow that processed the request
  • Source — Who initiated the request (end-user, admin, etc.)
  • Date Range — Limit results to a specific time period

Exporting Data

Click Export CSV to download the filtered log for offline analysis or compliance reporting. The export respects all active filters.

Best Practices

  • Use the Request Log during periodic access reviews to verify that all granted access went through the proper approval process.
  • Filter by denied requests periodically to spot patterns — frequent denials for a specific service may indicate the service description or approval flow needs adjustment.
  • Export logs before and after major organizational changes (reorgs, new policies) to document the transition.
  • Combine Request Log data with Access Inventory data for a complete picture of who has access and how they got it.

Troubleshooting

If an expected event is missing:

  • The request may still be in progress — check Pending Requests
  • Verify the time range filter includes the expected date
  • Some events (like deprovisioning) happen asynchronously and may appear with a slight delay

If you can't find a specific request:

  • Use the Request ID filter if you have it
  • Try searching by the user who submitted the request or the service name