Security log (access.log)

The security log contains information about authentication requests, also called attempts.

The security log is turned on by default.

You can configure:
  • When to start and stop collecting security data.
  • The level of data that is collected.
  • The log file size.

For information about configuring the size and contents of the security log, see IBM Verify Identity Governance logging properties.