Skip to main content
The audit log provides a complete, immutable record of administrative actions taken in your Turen organization.

What’s Logged

The following actions create audit log entries:
CategoryActions
API KeysKey created, key revoked
InvitationsInvitation sent, invitation accepted, invitation cancelled
MembersRole changed, member removed
OrganizationOrganization settings updated
PolicyPolicy updated
AuthLogin, logout, signup

Viewing Audit Logs

Navigate to Platform Settings > Org Settings > Audit Log (/settings/audit-log) to browse the full log. Each entry shows:
FieldDescription
TimestampWhen the action occurred
ActionWhat was done (with color-coded icon)
Resource IDWhat was affected
ActorWho performed the action (user email)
Click any log entry to expand its details, which include:
  • Audit ID — Unique identifier for the log entry
  • Resource type — Category of the affected resource (API Key, User, Invitation, etc.)
  • IP address — Source IP of the action
  • Details — Additional context in JSON format

Filtering

Use the filter bar and time range controls to narrow down the log:
  • Time range — Quick-select pills: 1h, 24h, 7d, 30d, or 90d
  • Action — Filter by specific action type (e.g., “API Key Created”, “Role Changed”)
  • Resource — Filter by resource type (e.g., API Key, User, Policy)
  • User Email — Free-text search by the actor’s email address
Filters are reflected in the URL, so you can bookmark or share filtered views.

Use Cases

Compliance

Demonstrate to auditors that access and changes are tracked and attributable.

Incident Investigation

Trace back who made a change and when, if something goes wrong.

Change Management

Track when policies were modified and by whom.

Access Review

Review who was added or removed from the team and when.

Retention

Audit logs are retained for 1 year on both Solo and Teams plans. They cannot be modified or deleted.