SecureAuth AI Gateway
Guides

Audit log

Monitor and search agent activity through the audit log

SecureAuth AI Gateway logs every action that passes through it. The audit log provides a complete record of what happened, when, and who was involved.

Audit log showing tool execution events
Every action is logged with the actor, resource, and outcome

What gets logged

The audit log captures events across the entire gateway:

  • Tool executions — every tool call made by an agent, including the tool name, MCP server, and whether it succeeded or was denied
  • Tool errors — failed tool calls with error type and description
  • Agent events — agent creation, updates, deletion, and first-time connections with client metadata
  • Resource events — MCP server creation, updates, and deletion
  • Policy events — policy creation, updates, and deletion with rule details
  • Connection events — user OAuth connections created and revoked

Event details

Each audit log entry includes:

  • Timestamp — when the event occurred
  • Actor — the user or agent that performed the action
  • Action — the event type (for example, gateway.tool.executed, policy.created)
  • Resource — the MCP server, agent, or policy involved
  • Details — action-specific payload (tool name, error type, policy effect, etc.)

Click any entry to expand it and see full details. Agent connection events show three buckets of tools: allowed outright, denied outright, and conditionally allowed — tools governed by an argument-level condition that's re-evaluated on every call against the live arguments. Tool executions show metadata like IP address and user agent.

Filtering

Use the filter dropdowns at the top of the audit log to narrow the feed:

  • Action — filter by event type (tool execution, agent connected, policy created, etc.)
  • Agent instance — see activity for a specific connected client
  • Agent — roll up across every instance of one agent (for example, all Claude Code clients)
  • Resource — see events related to a specific MCP server

Pagination

The audit log loads events in reverse chronological order. Scroll down and click Load more to fetch older events. The log scales to large feeds without slowdown.

Use cases

  • Debug a denied request — filter by agent and look for gateway.tool.error events with error_type: blocked_by_policy. Each blocked event references the policy that caused the block (id, name, description), so you can identify the responsible policy even if it has since been modified or renamed
  • Review agent onboarding — filter by agent.connected to see when agents first connected and what tools they were granted
  • Audit policy changes — filter by policy.created, policy.updated, or policy.deleted to track who changed access rules and when
  • Monitor a specific resource — filter by MCP server to see all tool calls made to that service across all agents

On this page