Introduction
This article describes the concept of logging the activity of a user of on the Trusted Twin platform. A given user’s activity can be logged with the User Activity Log functionality.
The purpose of this article is to provide system architects and developers with conceptual knowledge required to design solutions on the Trusted Twin platform. In order to consult developer resources, please go to the Trusted Twin docs website.
5 min read
Concept
The Trusted Twin platform allows to log activity in one’s own (personal) account:
- activity of a given user belonging to one’s own (personal) account,
- activity related to User Tokens generated by the given user belonging to one’s own (personal) account.
Read more: Authorization and Authentication
The User Activity Log functionality allows you to log activity in your account from a user’s perspective. If you need to create a log from a resources’ access perspective, you can use the Resource Access Log functionality.
Read more: Resource Activity Log
Timeseries configuration
The User Activity Log is stored in a user-defined Timeseries table. You can create multiple User Activity Log tables to log a user’s activity in your account.
Read more: Indexes and Timeseries
Developer resources
create_timeseries_table
Each User Activity Log table is defined as:
- a list of dimensions and their types,
- (optionally) a timestamp default template,
- default templates for dimensions.
The default dimension values are calculated using templates.
Read more: Templates
User configuration
The User Activity Log is configured for a given user. A single user can be added to many User Activity Log tables. Many users can be added to a single User Activity Log table.
Read more: Account and User
Developer resources
create_user
update_user
Tips & tricks
-
- To log data about access to resources in your account, you can use the Resource Access Log functionality.
Read more: Resource Access Log
Developer resources
Resource Access Log
-
If you want to create several User Tokens as a single user and distinguish request generated by each of the User Tokens in the User Activity Log, you can add details to the “secret_dict” of each User Token to distinguish between them and use the “DICT” template in the User Activity Log table so that these details are added to that User Activity Log table.
Read more: Authorization and Authentication