Security Logging
Settings - Security Log
The Security Log is a centralized record of security and authorization events across all PeopleSoft environments connected to Sentinel. It provides robust search and filtering capabilities, enabling authorized users to quickly locate, review, and retrieve security-related information for monitoring, audit, and investigation purposes.

Security Logging, Monitoring, and SIEM Integration
Sentinel provides a centralized Security Log that records security-related and authorization events across all connected PeopleSoft environments. Logged events include, but are not limited to:
User and administrator logins and login failures
Access denials and authorization failures
Security role and permission changes
User provisioning, de-provisioning, and modifications
Configuration and security updates accepted or rejected
The Security Log includes robust search and filtering capabilities, enabling authorized users to quickly locate, review, and retrieve security events for investigation, audit, or compliance purposes.
Requirements to implement logging and monitoring
To enable logging and monitoring, the following are required:
Sentinel application access with appropriate administrative permissions
Connectivity between Sentinel and the client’s PeopleSoft environments
Client-defined role assignments determining who may view or export security logs
Client-managed infrastructure logging (e.g., OS, database, network logs), which remains the client’s responsibility
Sentinel does not require access to client operating systems or databases to capture application-level security events.
SIEM / log collector usage
Sentinel supports integration with external SIEM or log collection platforms by allowing security log data to be:
Exported
Queried
Forwarded via standard mechanisms (e.g., API or scheduled extraction), depending on client configuration
This enables organizations to correlate Sentinel security events with enterprise-wide logs from identity providers, databases, and infrastructure systems for centralized monitoring and threat detection.
Automatic Sentinel Updates
Sentinel has auto-provisioning & de-provisioning features for Access Requests, Dynamic Security, and Temporary Access. The 'Updated By' field will show the following when changes are applied automatically:
SENTINEL_AR_AUTO - If security changes for an Access Request are applied automatically via auto-provisioning.
SENTINEL_JOB_# - If security changes are applied automatically for a Dynamic Role Assignment.
SENTINEL_TEMP_JOB_# - If security changes are applied automatically for a Temporary Access Job.
Last updated