Security log (access.log)
The security log contains information about authentication requests, also called attempts.
The security log is turned on by default.
You can
configure:
- When to start and stop collecting security data.
- The level of data that is collected.
- The log file size.
For information about configuring the size and contents of the security log, see IBM Verify Identity Governance logging properties.