Didit Console

Audit Logs

Audit Logs provide a comprehensive, searchable record of all API activity within your organization. Every request made to the Didit platform—whether from the Console, your integration, or team members—is automatically logged for security, compliance, and troubleshooting purposes.

This feature is essential for organizations that need to maintain regulatory compliance, investigate security incidents, or simply understand how their verification system is being used.


Why Audit Logs?

ChallengeSolution with Audit Logs
Regulatory compliance requirementsComplete 1-year audit trail of all activity
Security incident investigationTrace exactly who did what and when
Debugging integration issuesSee the exact requests and responses
Team accountabilityTrack which team members accessed what data
Usage monitoringUnderstand API consumption patterns

🖥️ Accessing Audit Logs

Navigate to Audit Logs in your Didit Console sidebar under the Console & Dashboard section. The Audit Logs interface displays a chronological list of all API requests made within your organization.

Each log entry includes:

  • Timestamp - When the request was made
  • User - Email of the user who made the request (if authenticated)
  • Method - HTTP method (GET, POST, PUT, DELETE, etc.)
  • Path - The API endpoint that was called
  • Status - HTTP response status code
  • IP Address - Origin IP of the request
  • Application - Which application the request was associated with

🔍 Filtering & Search

The Audit Logs interface provides powerful filtering capabilities to help you find exactly what you're looking for.

Smart Search

The search bar automatically detects what you're looking for:

Search TypeExampleBehavior
Exact Path/v1/organization/.../sessions/Finds logs with this exact request path
Exact Email[email protected]Finds logs from this specific user
Exact IP192.168.1.100Finds logs from this IP address
Wildcard/v1/*/analytics/*Matches patterns with wildcards
General TextsessionsFuzzy search across all fields

Available Filters

FilterDescriptionExample
ApplicationFilter by specific applicationSelect from dropdown
MethodFilter by HTTP methodGET, POST, PUT, DELETE
Status CodeFilter by response status200, 401, 500
Date RangeFilter by time periodLast 7 days, custom range

Common Filter Combinations

Find all failed requests:

  • Status Code: 400-599 or specific error codes like 401, 403, 500

Investigate a specific user's activity:

Track verification session access:

  • Search: /v1/session/
  • Method: GET

Find all data modifications:

  • Method: POST, PUT, PATCH, or DELETE

📊 Data Retention

Audit logs are retained for 1 year (365 days) to meet common compliance requirements:

TimeframeAvailability
Last 24 hours✅ Available
Last 7 days✅ Available
Last 30 days✅ Available
Last 90 days✅ Available
Last 365 days✅ Available
Older than 1 year❌ Automatically deleted

Note: For extended retention requirements, please contact our support team to discuss enterprise options.


🔐 Security & Privacy

What's Logged

Audit logs capture metadata about API requests, including:

  • Request timestamp and duration
  • User identity (email, user ID)
  • Request path and query parameters
  • Response status codes
  • Client IP address and user agent

What's NOT Logged

To protect sensitive data, the following are automatically excluded:

  • Request/response bodies
  • Authentication tokens and credentials
  • Passwords and secrets
  • Personal data from verification sessions

Access Control

Audit log access is restricted to users with Admin or Owner roles in your organization. Regular team members cannot view audit logs unless explicitly granted elevated permissions.


📋 Common Use Cases

Compliance Auditing

Demonstrate to auditors that you have complete visibility into who accessed verification data:

  1. Filter by date range matching the audit period
  2. Filter by specific applications or users if needed
  3. Export or screenshot the results for documentation

Security Investigation

If you suspect unauthorized access:

  1. Search for the affected user's email or suspicious IP addresses
  2. Filter by date range around the suspected incident
  3. Look for unusual patterns: failed authentication attempts, unexpected endpoints, odd hours

Integration Debugging

When troubleshooting API integration issues:

  1. Search for the specific endpoint path
  2. Filter by 4xx or 5xx status codes to find errors
  3. Note the timestamps to correlate with your application logs

Team Activity Review

Monitor how your team uses the platform:

  1. Filter by specific team member emails
  2. Review which sessions and features they accessed
  3. Ensure team members are following proper procedures

⚡ Best Practices

  1. Regular Reviews - Periodically review audit logs to catch anomalies early
  2. Narrow Your Search - Use specific filters to reduce noise and find relevant entries faster
  3. Date Ranges - Always specify a date range for better performance on large datasets
  4. Bookmark Searches - Save common filter combinations as browser bookmarks for quick access

🔗 Related Features

  • Manual Review - Review verification sessions with full audit trail
  • Analytics - Aggregate insights into your verification activity
  • Workflows - Configure automated verification flows