Resource Access Log

Introduction

This article describes the concept of logging the access to resources on the Trusted Twin platform. Access to resources can be logged with the Resource Access Log functionality.

The purpose of this article is to provide system architects and developers with conceptual knowledge required to design solutions on the Trusted Twin platform. In order to consult developer resources, please go to the Trusted Twin docs website.

5 min read

 

 

Figure 1. Resource Access Log on the Trusted Twin platform. 

Concept

The Trusted Twin platform allows you to log access to resources in your account. Access to resources can be logged:

  • for resources in one’s own account (personal account) for requests coming from one’s own (personal) account,
  • for resources in one’s own account (personal account) for requests coming from foreign accounts.

The access is logged from a resource’s perspective. If you need to create a log from a user’s activity perspective, please see the User Activity Log functionality.

Read more: User Activity Log

Timeseries configuration

The Resource Access Log is stored in a user-defined Timeseries table. You can create multiple Resource Access Log tables to log access to resources in your account.

Read more: Indexes and Timeseries

Developer resources
create_timeseries_table

Each Resource Access Log table is defined as:

  • a list of dimensions and their types,
  • (optionally) a timestamp default template,
  • default templates for dimensions.

The default dimension values are calculated using templates.

Read more: Templates

Account configuration

The Resource Access Log functionality is enabled at the account level. You can enable the Resource Access Log to log access to resources in multiple Timeseries tables for your account.

Each Resource Access Log table has a rule. The rule selects which resource access items are to be added to a given Resource Access Log table. For example, you could set a rule to only add resource access items to a given Resource Access Log table if the requestor is from an account with a given account UUID. The same selection rule can be applied to multiple Resource Access Log tables.

Read more: Rules

Developer resources
update_account

Tips & tricks

  • To log data about the activity of a given user belonging to your account, as well as the activity related to User Tokens generated by that user, you can use the User Activity Log functionality.

    Read more: User Activity Log

Developer resources
User Activity Log

For more information about how to use the Trusted Twin platform in your application’s architecture or technology stack, please contact hello@trustedtwin.com or schedule a video consultation with us through Calendly.

ON THIS PAGE