The security log file describes all the security changes, such as password changes, that have been made.
View the server log in the cluster log file.