Updated on 2025-04-16 GMT+08:00

Querying Application Access Records

After an application accesses the database through a proxy, the system automatically records the access. The administrator can periodically check and audit the access record list.

Prerequisites

The device records only the information about the application's access to the database through a proxy.

Procedure

  1. Log in to a database encryption and access control instance as the sysadmin user.
  2. In the navigation tree on the left, choose Data Encryption > Application Access Logs. The Access Records List page is displayed.
  3. In the access record list, view the application access information, including the data source name, data source IP address, proxy IP address, and application IP address.

    You can set the asset type and name to filter access records.