UAM Schema
Universal audit model (UAM) is Immuta's consistent structure for all Immuta system and user query audit logs. This reference guide provides example schemas of all the UAM events available in Immuta.
There are some parameter details throughout to help better understand the UAM schemas. But there are two important parameters to each event:
targetType: Informs the Immuta object that's the target of the action being audited. This will specify if it was a user, project, policy, etc. being affected by the action.action: Informs the base action being performed on the target. This will specify if something was created, deleted, updated, etc.
To learn more about Immuta's audit, see the UAM reference page or view the examples below.
Events and descriptions
Data sources
Audit events for actions on data sources and their policies.
Domains
Audit events for managing domains, domain policies, and domain permissions.
Global policies
Audit events for managing global policies.
Groups
Audit events for managing Immuta groups and group members.
Policy adjustments
Audit events for managing policy adjustments in a project.
Projects
Audit events for managing projects and their purposes.
Queries
DatabricksQuery: Available for Unity Catalog or Databricks Spark
Audit events for user queries within data platforms.
Sensitive data discovery (SDD)
Audit events for managing and running SDD.
Tags
Audit events for managing tags and their application.
Users
Audit events for user actions, managing users, and managing the objects users are subscribed to in Immuta.
ApiKeyCreated event
Event:
ApiKeyCreatedLegacy event:
apiKeyDescription: An audit event for when an API key is created on the Immuta app settings page or from an Immuta user's profile page.
ApiKeyDeleted event
Event:
ApiKeyDeletedLegacy event:
apiKeyDescription: An audit event for when an API key is deleted on the Immuta app settings page or from an Immuta user's profile page.
AttributeApplied event
Event:
AttributeAppliedLegacy events:
accessUserandaccessGroupDescription: An audit event for an attribute applied to a group or user.
Additional parameter details:
targetTypewill specify whether the attribute was added to aUSERorGROUP.
AttributeRemoved event
Event:
AttributeRemovedLegacy events:
accessUserandaccessGroupDescription: An audit event for an attribute removed from a group or user.
Additional parameter details:
targetTypewill specify whether the attribute was removed from aUSERorGROUP.
ConfigurationUpdated event
Event:
ConfigurationUpdatedLegacy event:
configurationUpdateDescription: An audit event for updates to the configuration on the Immuta app settings page.
DatasourceAppliedToProject event
Event:
DatasourceAppliedToProjectLegacy event:
addToProjectDescription: An audit event for adding a data source to an Immuta project.
DatasourceCatalogSynced event
Event:
DatasourceCatalogSyncedLegacy event:
catalogUpdateDescription: An audit event for syncing an external catalog to tag Immuta data sources.
DatasourceCreated event
Event:
DatasourceCreatedLegacy event:
dataSourceCreateDescription: An audit event for registering a table as an Immuta data source.
DatasourceDeleted event
Event:
DatasourceDeletedLegacy event:
dataSourceDeleteDescription: An audit event for deleting a data source in Immuta.
DatasourceDisabled event
Event:
DatasourceDisabledLegacy event: None
Description: An audit event for disabling a data source in Immuta.
DatasourceGlobalPolicyApplied event
Event:
DatasourceGlobalPolicyAppliedLegacy event:
globalPolicyAppliedDescription: An audit event for applying a global policy to a data source.
DatasourceGlobalPolicyConflictResolved event
Event:
DatasourceGlobalPolicyConflictResolvedLegacy event:
globalPolicyConflictResolvedDescription: An audit event for a global policy conflict being resolved on a data source.
DatasourceGlobalPolicyDisabled event
Event:
DatasourceGlobalPolicyDisabledLegacy event:
globalPolicyDisabledDescription: An audit event for a data owner disabling a global policy from their data source.
DatasourceGlobalPolicyRemoved event
Event:
DatasourceGlobalPolicyRemovedLegacy event:
globalPolicyRemovedDescription: An audit event for a data owner removing a global policy from their data source.
DatasourcePolicyCertificationExpired event
Event:
DatasourcePolicyCertificationExpiredLegacy event:
policyCertificationExpiredDescription: An audit event for a global policy certification expiring on a data source.
DatasourcePolicyCertified event
Event:
DatasourcePolicyCertifiedLegacy event:
globalPolicyCertifyDescription: An audit event for a global policy being certified by a data owner for their data source.
DatasourcePolicyDecertified event
Event:
DatasourcePolicyDecertifiedLegacy events: None
Description: An audit event for a global policy being decertified on a data source.
DatasourceRemovedFromProject event
Event:
DatasourceRemovedFromProjectLegacy event:
removeFromProjectDescription: An audit event for removing a data source from a project.
DatasourceUpdated event
Event:
DatasourceUpdatedLegacy events:
dataSourceUpdateanddataSourceSaveDescription: An audit event for updating a data source with the new data source details.
DomainCreated event
Event:
DomainCreatedLegacy event:
collectionCreatedDescription: An audit event for creating a domain.
DomainDataSourcesUpdated event
Event:
DomainDataSourcesUpdatedLegacy events:
collectionDataSourceAdded,collectionDataSourceRemoved, andcollectionDataSourceUpdatedDescription: An audit event for updating a domain's data sources.
Additional parameter details: auditPayload.updateType will specify whether the data source was added to or removed from the domain.
DomainDeleted event
Event:
DomainDeletedLegacy event:
collectionDeletedDescription: An audit event for deleting a domain.
DomainPermissionsUpdated event
Event:
DomainPermissionsUpdatedLegacy events:
collectionPermissionGrantedandcollectionPermissionRevokedDescription: An audit event for granting or revoking a user's domain-related permissions.
Additional parameter details: auditPayload.updateType will specify whether the permission was granted to or revoked from a user.
DomainUpdated event
Event:
DomainUpdatedLegacy event:
collectionUpdatedDescription: An audit event for updating an Immuta domain.
GlobalPolicyApprovalRescinded event
Event:
GlobalPolicyApprovalRescindedLegacy event:
globalPolicyApprovalRescindedDescription: An audit event for a global policy approval rescinded in the approve to promote workflow.
GlobalPolicyApproved event
Event:
GlobalPolicyApprovedLegacy event:
globalPolicyApprovedDescription: An audit event for a global policy approved in the approve to promote workflow.
GlobalPolicyChangeRequested event
Event:
GlobalPolicyChangeRequestedLegacy event:
globalPolicyChangeRequestedDescription: An audit event for requested edits on a global policy in the approve to promote workflow.
GlobalPolicyCreated event
Event:
GlobalPolicyCreatedLegacy event:
globalPolicyCreateDescription: An audit event for creating a global policy.
GlobalPolicyDeleted event
Event:
GlobalPolicyDeletedLegacy event:
globalPolicyDeleteDescription: An audit event for deleting a global policy.
GlobalPolicyPromoted event
Event:
GlobalPolicyPromotedLegacy event:
globalPolicyPromotedDescription: An audit event for when a global policy is fully approved and promoted to production in the approve to promote workflow.
GlobalPolicyReviewRequested event
Event:
GlobalPolicyReviewRequestedLegacy event:
globalPolicyReviewRequestedDescription: An audit event for when a global policy is ready and requests a review in the approve to promote workflow.
GlobalPolicyUpdated event
Event:
GlobalPolicyUpdatedLegacy event:
globalPolicyUpdateDescription: An audit event for a global policy being updated with details about the policy.
GroupCreated event
Event:
GroupCreatedLegacy event:
accessGroupDescription: An audit event for a group created in Immuta.
GroupDeleted event
Event:
GroupDeletedLegacy event:
accessGroupDescription: An audit event for a group deleted in Immuta.
GroupMemberAdded event
Event:
GroupMemberAddedLegacy event:
accessGroupDescription: An audit event for a member added to a group in Immuta.
GroupMemberRemoved event
Event:
GroupMemberRemovedLegacy event:
accessGroupDescription: An audit event for a group member removed from the group in Immuta.
GroupUpdated event
Event:
GroupUpdatedLegacy event:
accessGroupDescription: An audit event for a group updated in Immuta.
LicenseCreated event
Event:
LicenseCreatedLegacy event:
licenseCreateDescription: An audit event for creating an Immuta license.
LicenseDeleted event
Event:
LicenseDeletedLegacy event:
licenseDeleteDescription: An audit event for deleting an Immuta license.
LocalPolicyCreated event
Event:
LocalPolicyCreatedLegacy event:
policyHandlerCreateDescription: An audit event for creating a local policy for an Immuta data source.
LocalPolicyUpdated event
Event:
LocalPolicyUpdatedLegacy event:
policyHandlerUpdateDescription: An audit event for updating a local policy on an Immuta data source.
PermissionApplied event
Event:
PermissionAppliedLegacy event:
accessUserDescription: An audit event for a permission applied to an Immuta user.
PermissionRemoved event
Event:
PermissionRemovedLegacy event:
accessUserDescription: An audit event for a permission removed from an Immuta user.
PolicyAdjustmentCreated event
Event:
PolicyAdjustmentCreatedLegacy event:
policyAdjustmentCreateDescription: An audit event for creating a policy adjustment in an Immuta project.
PolicyAdjustmentDeleted event
Event:
PolicyAdjustmentDeletedLegacy event:
policyAdjustmentDeleteDescription: An audit event for deleting a policy adjustment in an Immuta project.
ProjectCreated event
Event:
ProjectCreatedLegacy event:
projectCreateDescription: An audit event for creating a project in Immuta.
ProjectDeleted event
Event:
ProjectDeletedLegacy event:
projectDeleteDescription: An audit event for deleting a project in Immuta.
ProjectDisabled event
Event:
ProjectDisabledLegacy events: None
Description: An audit event for disabling a project in Immuta.
ProjectPurposeApproved event
Event:
ProjectPurposeApprovedLegacy event:
projectPurposeApproveDescription: An audit event for approving a purpose for a project in Immuta.
ProjectPurposeDenied event
Event:
ProjectPurposeDeniedLegacy event:
projectPurposeDenyDescription: An audit event for denying a purpose for a project in Immuta.
ProjectPurposesAcknowledged event
Event:
ProjectPurposesAcknowledgedLegacy event:
acknowledgePurposesDescription: An audit event for acknowledging a purpose for a project in Immuta.
ProjectUpdated event
Event:
ProjectUpdatedLegacy event:
projectPurposeDenyDescription: An audit event for updating a project in Immuta.
PurposeDeleted event
Event:
PurposeDeletedLegacy event:
purposeDeleteDescription: An audit event for deleting a purpose in Immuta.
PurposeUpdated event
Event:
PurposeUpdatedLegacy event:
purposeUpdateDescription: An audit event for updating a purpose in Immuta.
PurposeUpserted event
Event:
PurposeUpsertedLegacy event:
purposeCreateDescription: An audit event for creating a purpose in Immuta.
SDDClassifierCreated event
Event:
SDDClassifierCreatedLegacy event:
sddClassifierCreatedDescription: An audit event for creating a sensitive data discovery (SDD) column name regex, regex, or dictionary pattern.
Additional parameter details:
auditPayload.config.columnNameRegex: For column name regex patterns, the regex to match against column names.
auditPayload.config.values: For dictionary patterns, the values within the dictionary pattern to match against column values.
auditPayload.config.regex: For regex patterns, the regex to match against column values.
SDDClassifierDeleted event
Event:
SDDClassifierDeletedLegacy event:
sddClassifierDeletedDescription: An audit event for deleting a sensitive data discovery (SDD) pattern.
SDDClassifierUpdated event
Event:
SDDClassifierUpdatedLegacy event:
sddClassifierUpdatedDescription: An audit event for updating a sensitive data discovery (SDD) column name regex, regex, or dictionary pattern.
Additional parameter details:
auditPayload.config.columnNameRegex: For column name regex patterns, the regex to match against column names.
auditPayload.config.values: For dictionary patterns, the values within the dictionary pattern to match against column values.
auditPayload.config.regex: For regex patterns, the regex to match against column values.
SDDDatasourceTagUpdated event
Event:
SDDDatasourceTagUpdatedLegacy event:
sddDatasourceTagUpdateDescription: An audit event for the results from a sensitive data discovery (SDD) run that updates the tags on Immuta data sources.
SDDTemplateApplied event
Event:
SDDTemplateAppliedLegacy event:
sddTemplateAppliedDescription: An audit event for applying an identification framework to data sources.
SDDTemplateCloned event
Event:
SDDTemplateClonedLegacy event:
sddTemplateCreatedDescription: An audit event for cloning an identification framework from another framework.
SDDTemplateCreated event
Event:
SDDTemplateCreatedLegacy event:
sddTemplateCreatedDescription: An audit event for creating an identification framework.
SDDTemplateDeleted event
Event:
SDDTemplateDeletedLegacy event:
sddTemplateDeletedDescription: An audit event for deleting an identification framework.
SDDTemplateUpdated event
Event:
SDDTemplateUpdatedLegacy event:
sddTemplateUpdatedDescription: An audit event for updating an identification framework.
SubscriptionCreated event
Event:
SubscriptionCreatedLegacy events:
dataSourceSubscriptionandprojectSubscriptionDescription: An audit event for subscribing a user to a data source or project.
Additional parameter details: auditPayload.modelType will specify whether the user was subscribed to a
DATASOURCEorPROJECT.
SubscriptionDeleted event
Event:
SubscriptionUpdatedLegacy events:
dataSourceSubscriptionandprojectSubscriptionDescription: An audit event for removing a user's subscription to a data source or project.
Additional parameter details: auditPayload.modelType will specify whether the user's subscription was removed from a
DATASOURCEorPROJECT.
SubscriptionRequestApproved event
Event:
SubscriptionUpdatedLegacy events:
dataSourceSubscriptionandprojectSubscriptionDescription: An audit event for a user's request to subscribe to a data source or project.
Additional parameter details: targets.model.type will specify whether the subscription was approved for a
DATASOURCEorPROJECT.
SubscriptionRequestDenied event
Event:
SubscriptionUpdatedLegacy events:
dataSourceSubscriptionandprojectSubscriptionDescription: An audit event for denying a user's request to subscribe to a data source or project.
Additional parameter details: auditPayload.modelType will specify whether the user's subscription was denied for a
DATASOURCEorPROJECT.
SubscriptionRequested event
Event:
SubscriptionRequestedLegacy events:
dataSourceSubscriptionandprojectSubscriptionDescription: An audit event for a user requesting to subscribe to a data source or project.
Additional parameter details: auditPayload.modelType will specify whether the user requested to subscribe to a
DATASOURCEorPROJECT.
SubscriptionUpdated event
Event:
SubscriptionUpdatedLegacy events:
dataSourceSubscriptionandprojectSubscriptionDescription: An audit event for a user subscribing to a data source or project.
Additional parameter details: targets.model.type will specify whether the subscription was updated on a
DATASOURCEorPROJECT.
TagApplied event
Event:
TagAppliedLegacy event:
tagAddedDescription: An audit event for applying a tag to an object in Immuta.
TagCreated event
Event:
TagCreatedLegacy event:
tagCreatedDescription: An audit event for creating a tag in Immuta.
TagDeleted event
Event:
TagDeletedLegacy event:
tagDeletedDescription: An audit event for deleting a tag in Immuta.
TagRemoved event
Event:
TagRemovedLegacy event:
tagRemovedDescription: An audit event for removing a tag from an object in Immuta.
TagUpdated event
Event:
TagUpdatedLegacy event:
tagUpdatedDescription: An audit event for updating a tag in Immuta.
UserAuthenticated event
Event:
UserAuthenticatedLegacy event:
authenticateDescription: An audit event for a user authenticating in Immuta.
Additional parameter details:
authenticationMethodpossible values includeOAuth: The user authenticated using the 3rd party authentication OAuth.OpenId: The user authenticated using the 3rd party authentication OpenId.SAML: The user authenticated using the 3rd party authentication SAML.apiKey: The user authenticated or impersonated using an API key.password: The user authenticated with username and password.
UserCloned event
Event:
UserClonedLegacy event:
accessUserDescription: An audit event for creating a new user in Immuta by cloning an existing user.
UserCreated event
Event:
UserCreatedLegacy event:
accessUserDescription: An audit event for creating a new user in Immuta.
UserDeleted event
Event:
UserDeletedLegacy event:
accessUserDescription: An audit event for deleting a user in Immuta.
UserLogout event
Event:
UserLogoutLegacy events: None
Description: An audit event for a user logging out of Immuta.
Additional parameter details:
authenticationMethodpossible values includeOAuth: The user authenticated using the 3rd party authentication OAuth.OpenId: The user authenticated using the 3rd party authentication OpenId.SAML: The user authenticated using the 3rd party authentication SAML.apiKey: The user authenticated or impersonated using an API key.password: The user authenticated with username and password.
logoutReasonpossible values includeEXPIRATION: The user was logged out because the token expired.IDP_INITIATED: The IdP initiated the logout.USER_LOGOUT_TRIGGERED: The user manually logged out.
UserOneTimeTokenCreated event
Event:
UserOneTimeTokenCreatedLegacy event:
accessUserDescription: An audit event for creating a single use login token for a user.
UserPasswordUpdated event
Event:
UserPasswordUpdatedLegacy event:
accessUserDescription: An audit event for updating a user's Immuta password.
UserUpdated event
Event:
UserUpdatedLegacy event:
externalUserIdChangedDescription: An audit event for updating user details in Immuta.
WebhookCreated event
Event:
WebhookCreatedLegacy event:
webhookCreateDescription: An audit event for creating an Immuta webhook.
WebhookDeleted event
Event:
WebhookDeletedLegacy event:
webhookDeleteDescription: An audit event for deleting an Immuta webhook.
Last updated
Was this helpful?

