Retrieve a single audit log entry by its unique identifier.
Authenticate requests using a bearer token.
Supported token types:
Header format
Authorization: Bearer <your_token>Name of the organization to scope the request to. This header is required in multi-tenant deployments.
Organization name used to resolve the tenant context.
API version identifier (for example, v1 or v2). Defaults to v1
when not provided.
API version to target for this request.
UUID of the audit log entry to retrieve.
Identifier of the audit log entry.
"<uuid>"
Request succeeded and the requested audit log entry is returned.
Response representation of an audit log entry, including core fields and a formatted, human-readable message.
Key that identifies the type of action recorded (for example, policy_updated).
"<timestamp>"
"<uuid>"
Human-readable message describing the audit event, derived from the structured fields in the log.
"<uuid>"
Short verb or phrase that summarizes the action taken (for example,
created, updated, deleted).
100Email address of the actor who performed the action.
320UUID of the user or system principal responsible for the action.
"<uuid>"
Type of actor that initiated the event (for example, user or system).
100Arbitrary metadata associated with the event, represented as a JSON object.
Time at which the event occurred, as reported by the emitting service.
"<timestamp>"
Name of the organization to which this audit log entry belongs.
Name of the service that wrote the audit log entry.
100Optional email address associated with the resource or subject affected by the action.
320Identifier of the resource affected by the action.
"<uuid>"
Type of resource affected by the action (for example, user, group, policy).
100