Every action recorded. No guesswork.

Vauzy captures a complete trail of activity, from logins to edits and credential access. You can always see who did what, when it happened, and from which IP. Clear, tamper-resistant evidence you can trust.

Vauzy | Secure passwordless password manager
Kelly
Feb 9, 2026, 6:49:44 PM
Accessed the credential for TikTok via the Super Client vault.
Vauzy | Secure passwordless password manager
Jane
Feb 9, 2026, 6:49:44 PM
Accessed the credential for Instagram via the Super Client vault.
Vauzy | Secure passwordless password manager
Maciej
Feb 9, 2026, 6:49:44 PM
Edited the credential for LinkedIn in vault Pied Piper.
Complete timeline of actions, from logins to credential updates and access, with easy scanning and filtering

Complete timeline

From login to updating credentials and accessing them. One continuous record that’s easy to scan and filter.

Search by user, action, vault, credential, date range, or IP to get answers fast

Find what matters

Search by user, action, vault, credential, date range, or IP to get answers fast.

Clients see agency actions, agencies see client activity. Client names are obscured for agencies to protect privacy

Shared visibility

Clients see agency actions, agencies see client activity. Client names are obscured for agencies to protect privacy.

What's in the logs?

Logins and sessions

Successful and failed authentication attempts, session starts and ends, with originating IP.

Create, update, delete

Credential and vault changes, including permission updates, recorded with actor, timestamp, and IP.

Credential access

Who viewed or used a credential, when they accessed it, and from which IP, across shared vaults.

Sharing and invites

Vault and credential share events, invite accepts, and role changes, all tracked for accountability.

Admin and policy

Changes to vault access and organisation settings, captured with full context.

Exports and reports

Generate shareable summaries to show activity and compliance progress without exposing sensitive values.

How it works

  1. 1

    Record

    Every action is captured in real time with actor, action, timestamp, and IP.

  2. 2

    Review

    Filter by user, vault, credential, or severity. Surface anomalies and unusual access patterns instantly.

  3. 3

    Report

    Share summaries with stakeholders or clients. Build trust with clear evidence and a consistent trail.

Shared transparency, protected privacy

Audit logs are visible to both sides. Clients see which agency users acted. Agencies see client activity with client names obscured. Logs include IP addresses, not device data. GDPR-aligned by design.

Frequently asked

Do you log every action?

Yes. We record authentication events, creation, updating, deletion, sharing, and accessing of credentials. Each entry includes the actor, timestamp, and originating IP.

Who can see the logs?

Both sides have visibility in shared contexts. Clients see agency user actions. Agencies can review client activity with privacy safeguards that obscure client names.

Do logs include device details?

We capture IP addresses for context. Device information is not collected at this time.

Can I export logs?

Yes. Create time-bounded exports and shareable summaries that exclude sensitive values while preserving the evidence you need.

Proof, not promises

Show exactly how access was handled, by whom, and when. Confidence built on evidence.