
User was added to project and with which permissions.Project created, deleted, renamed, moved (transferred), changed path.Group events can also be accessed via the Group Audit Events API Project eventsĪ user with a Maintainer role (or above) can retrieve project audit events of all users.Ī user with a Developer role is limited to project audit events based on their individual actions. Event streaming destination created, updated, or deleted.Compliance framework created, updated, or deleted.Group CI/CD variable added, removed, or protected status changed.Roles allowed to create project changed.2FA enforcement or grace period changed.Removal of a previously shared group with a project.Project repository imported into group.Permissions changes of a user assigned to a group.Enforcing users to have dedicated group-managed accounts.

Enforcing SSO-only authentication for Git and Dependency Proxy activity.Enforcing SSO-only authentication for web activity.Introduced in GitLab 14.5, changes to the following.User was added to group and with which permissions.On the left sidebar, select Security & Compliance > Audit Events.įrom there, you can see the following actions:.Group events do not include project audit events. Developer or Maintainer role is limited to group audit events based on their individual actions.Owner role (or above) can retrieve group audit events of all users.These are visible in the instance Audit Events. Extra audit events are recorded for the start and stop of the administrator’s impersonation session.These are visible in their respective Audit Event pages depending on their type (Group/Project/User). Usual audit events include information about the impersonating administrator.When a user is being impersonated, their actions are logged as audit events as usual, with two additional details: Instance events scoped to the whole GitLab instance, used by your Compliance team to.Events scoped to the group or project, used by group and project managers.In GitLab, and who gave them that permission level. Track which users have access to a certain group of projects.Check who changed the permission level of a particular.Permission level, who added a new user, or who removed a user.

For example, these actions could be a change to a user To track important events such as who performed certain actions and the
