Hello! Unfortunately a colleague of mine was let go last week. He was removed from our list of users and removed from our password vault. Today, I noticed a credential that shows it was updated in the last hour which is odd because no one with access has made a change.
I have reset the administrator account’s password but I would like to know if there is any kind of audit trail that I can see such as whether the admin account was recently logged into (besides me) and what was changed. Thanks!
Via the API you can do some Audit calls but unsure what they exactly give data wise.
For this credential is it possible it was updated because of the credentials being refreshed, like with oauth?
It would then show you the new date as it is refreshing in the background.