mirror of
https://github.com/pocket-id/pocket-id.git
synced 2025-12-09 17:23:22 +03:00
🚀 Feature: Global Access Log for Admins #338
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @panteLx on GitHub.
Originally assigned to: @kmendell on GitHub.
Feature description
Hi,
what do you think about the idea of a global access log where admins of pocket id can see who logged in at what exact time and if the login was successful or failed.
Best wishes
panteL
Pitch
I think it would be cool to see the access data of all users as an admin, especially the failed once to check if some bots are trying to get into the accounts.
See authentik for examples. You can even see how many times the login failed, when it passes and many more things.
@kmendell commented on GitHub:
I had this idea awhile back, to have a Log Page in the UI to track When jobs run like ldap sync etc, though i talked my self out of it could it could add complexity or confusion to pocket-id
@panteLx commented on GitHub:
Im just talking about a simple access log like the already existing one but a global one for admins where they can see a log of all users access attempts. Not something crazy like a log for LDAP sync :D
@stonith404 commented on GitHub:
Failed login attempts don't really make sense because it's impossible to brute force a passkey without a quantum computer.
Would it be useful to see the other events anyway as an admin?
@kmendell commented on GitHub:
I could see how this is useful, especially for a bigger org use case though i can see some drawbacks as well...
@stonith404 commented on GitHub:
@kmendell Yeah I think this would be a bit an overkill because the logs can be viewed and organized with other tools.
@nebula-it commented on GitHub:
IMO even if one cannot brute force passkey, its good for admin to have visibility into a potential brute force attack.
@kmendell commented on GitHub:
This was merged in:
b65e693e12, and should be available in the next release.@kmendell commented on GitHub:
I think for now the scope of this feature will be just a global audit log with the existing events that already are log per user.
@stonith404 Feel free to add anything to this or correct me if im wrong.
@nikdoof commented on GitHub:
It'd be nice to have some options for the event logging as well, say output to a log file, or even just have a standardised way of DB access for the events. I can imagine that bigger orgs would like to include user modification events into their SIEM.
@kmendell commented on GitHub:
@nikdoof For those type of events you can use the docker compose log exporter and you can export the logs to a seim like splunk, graylog etc. See below for a example of this.