Enabling Logging for Risk-based Authentication

  1. Click Devices > Identity Servers > Edit > Auditing and Logging.

  2. Select Enabled under File Logging.

  3. In the Component File Logger Levels section, specify any one of the following options for application logs:

    • Severe: Logs serious failures that can stop system processing.

    • Warning: Logs potential failures that have minimal impact on execution.

    • Info: Logs informational events.

    • Verbose: Logs static configuration information.

      The system logs any configuration errors under one of the three primary levels: Severe, Warning, and Info.

    • Debug: Logs events for all other log levels: Severe, Warning, Info, and Verbose.

For more information, see Section 23.3, Identity Server Logging.