Introduction
Audit logs are available exclusively for Enterprise customers with SCIM enabled. Contact our sales team at sales@replit.com to enable this feature for your organization.
Key Features
Comprehensive Event Tracking
Monitor user lifecycle events including provisioning, deprovisioning, invitations, and role changes
Audit Log Portal
Search, filter, and review audit events through a dedicated log viewer portal
SIEM Integration
Stream audit logs in real time to your existing security tools via log streaming
Admin-Only Access
Only organization admins can view audit logs and configure streaming, keeping your security data protected
Prerequisites
Before you can use audit logs, your organization must meet the following requirements:- Enterprise plan — Audit logs are an Enterprise-only feature
- SCIM enabled and active — Your organization must have SCIM configured with an active directory sync
- Admin role — Only organization admins can access audit logs and configure SIEM integration
Getting Started
Enable SCIM
If you haven’t already, enable and configure SCIM for your organization through Organization Settings > Authentication
View Audit Logs
Once SCIM is active, navigate to Organization Settings > Authentication > Audit Logs and select View audit logs to open the audit log portal
Tracked Events
Audit logs capture security-relevant events across your organization, including user lifecycle actions such as provisioning, deprovisioning, and invitation management. The set of tracked events is actively expanding. For a full list of currently tracked events, contact your Replit account representative or reach out to sales@replit.com.Audit log events are designed with privacy in mind. Only customer-facing identifiers like email addresses and organization slugs are recorded — internal system IDs are never exposed.
Viewing Audit Logs
To view your organization’s audit logs:- Go to Organization Settings > Authentication
- In the Audit Logs section, select View audit logs
- The audit log portal opens, where you can search, filter, and review events
- Search — Find specific events by keyword
- Filters — Narrow results by event type, date range, actor, or target
- Export — Download log data for offline analysis or compliance reporting
SIEM Integration
SIEM (Security Information and Event Management) integration allows you to stream audit log events in real time to your existing security tools. This is useful for:- Centralizing security monitoring across all your enterprise tools
- Setting up automated alerts based on audit log patterns
- Meeting compliance requirements for log retention and analysis
Setting Up Log Streaming
- Go to Organization Settings > Authentication
- In the Audit Logs section, select Set up SIEM integration
- The log streaming configuration portal opens
- Follow the instructions to connect your SIEM provider
- Datadog
- Splunk
- Amazon S3
- Generic HTTP endpoint (webhook)
Log streaming is configured through the WorkOS portal. Changes to your streaming configuration take effect immediately.