User Activity Log

Introduction

This article describes the concept of logging the activity of a user of on the Trusted Twin platform. A given user’s activity can be logged with the User Activity Log functionality.

The purpose of this article is to provide system architects and developers with conceptual knowledge required to design solutions on the Trusted Twin platform. In order to consult developer resources, please go to the Trusted Twin docs website.

5 min read

 

 

Figure 1. User Activity Log on the Trusted Twin platform. 

Concept

The Trusted Twin platform allows to log activity in one’s own (personal) account:

  • activity of a given user belonging to one’s own (personal) account,
  • activity related to User Tokens generated by the given user belonging to one’s own (personal) account.

Read more: Authorization and Authentication

The User Activity Log functionality allows you to log activity in your account from a user’s perspective. If you need to create a log from a resources’ access perspective, you can use the Resource Access Log functionality.

Read more: Resource Activity Log

Timeseries configuration

The User Activity Log is stored in a user-defined Timeseries table. You can create multiple User Activity Log tables to log a user’s activity in your account.

Read more: Indexes and Timeseries

Developer resources
create_timeseries_table

Each User Activity Log table is defined as:

  • a list of dimensions and their types,
  • (optionally) a timestamp default template,
  • default templates for dimensions.

The default dimension values are calculated using templates.

Read more: Templates

User configuration

The User Activity Log is configured for a given user. A single user can be added to many User Activity Log tables. Many users can be added to a single User Activity Log table.

Read more: Account and User

Developer resources
create_user
update_user

Tips & tricks

    • To log data about access to resources in your account, you can use the Resource Access Log functionality.

Read more: Resource Access Log

Developer resources
Resource Access Log

  • If you want to create several User Tokens as a single user and distinguish request generated by each of the User Tokens in the User Activity Log, you can add details to the “secret_dict” of each User Token to distinguish between them and use the “DICT” template in the User Activity Log table so that these details are added to that User Activity Log table.

    Read more: Authorization and Authentication

For more information about how to use the Trusted Twin platform in your application’s architecture or technology stack, please contact hello@trustedtwin.com or schedule a video consultation with us through Calendly.

ON THIS PAGE