Centralized Audit Trails You Can Actually Trust
Keymate records every meaningful event—authorization checks, policy changes, role assignments, token issuance, and impersonation—into structured, queryable audit logs. These logs are tenant-aware, session-linked, and ready for compliance, forensics, and operational monitoring.
Centralized Audit Trails You Can Actually Trust
Audit Visibility from Policy Change to Runtime Access
Keymate captures and correlates all critical IAM activities, including: Policy updates and versioning actions. Role and permission assignments or removals. Delegation and impersonation events. Token issuance, refresh, revocation. Authorization decisions (grant/deny), evaluated in FGAC. Subscription events and transformations (if applicable). Each log includes: Timestamp, tenant, user, session, and IP. Affected resource or policy. Change actor and target. Correlation with trace ID and decision outcome. These logs feed into both SIEM systems and SigNoz dashboards, and are optionally retained long-term for regulatory requirements (e.g., KVKK, GDPR, ISO 27001).
Comprehensive Audit Logging Pipeline
Comprehensive audit logging system that captures every IAM event with structured, queryable logs for compliance, forensics, and operational monitoring.
Example: Every change, every token, every decision—logged and searchable
Key Components:
What Makes It Unique
Structured Audit Logs
JSON-based logs with consistent schema across all modules
Real-Time Log Streaming
Logs sent instantly to Kafka, Elasticsearch, or file sinks
Session-Linked Events
Every log tied to the user session and trace context
Multi-Tenant Isolation
Logs are logically and physically isolated per tenant
Impersonation & Delegation Tracing
Logs record both actual and acting user identity
Policy & Role Lifecycle Audits
Track who changed what, when, and how (including version diffs)
Access Decision Logging
Every FGAC decision includes policy match details
Compliance-Ready Retention
Configurable log storage with encryption and rotation policies
Frequently Asked Questions
How to Use This Feature
Follow these steps to enable comprehensive audit logging for all IAM activities.