Security logs provide security details for individual applications, application connections, and users. Logs capture authentication failures and errors, and provide supporting information that identifies request-response messaging, package and MBO details, security configuration, and the thread and node that attempted to process an authentication  request.
- Time – the time and date stamp for the log entry.
 
-  Application ID – the unique identifier assigned  to the registered application. Values may include a number, blank, or HWC, depending on the client type.
 
-  Application Connection  ID – the unique identifier for  a user application connection.
 
-  User – the name of the user associated with the application ID. 
 
- Correlation ID – the unique ID associated with every request-response message pair.
 
- Package – the name of the package to which the subscription belongs.
 
- MBO – the mobile business object used.
 
- Security Configuration – the associated security configuration.
 
- Method – the MBO operation used.
 
- Thread ID  – the identifier for the thread used to process the request.
 
- Node ID – the server node on which the request is received.
 
- Outcome – the authentication outcome for  the security check.
 
- Reason – the reason for authentication failure.
 
- Error – the error message if any.