Skip to main content
Audit logs give organization admins visibility into security-sensitive actions performed within their Cal.com organization. Every tracked event records who did what, when, and from where — giving you an immutable trail for compliance and incident investigation.
Audit logs are an enterprise feature available to organizations on an enterprise plan.

What gets logged

Cal.com records events across four categories:

Security events

EventDescription
LoginA user logged in to the organization
Password changedA user changed their password
Two-factor enabledA user turned on two-factor authentication
Two-factor disabledA user turned off two-factor authentication
Impersonation startedAn admin began impersonating another user
Impersonation stoppedAn admin stopped impersonating another user
Email changedA user updated their email address

Access control events

EventDescription
Member addedOne or more users were invited to a team
Member removedA user was removed from a team
Role changedA member’s role was updated (e.g., Member to Admin)

API key events

EventDescription
API key createdA new API key was generated
API key revokedAn existing API key was revoked

Workflow events

EventDescription
Workflow createdA new workflow was created
Workflow modifiedAn existing workflow was updated
Workflow deletedA workflow was deleted

What each log entry contains

Every audit log entry includes:
  • Who — the user who performed the action
  • What — the specific action taken, along with previous and new values when applicable (e.g., a role change from Member to Admin)
  • Where — the target resource (team, membership, API key, or workflow)
  • When — the timestamp of the event
  • Source — how the action was performed (web app, API, SAML, OAuth, etc.)
  • Result — whether the action succeeded, failed, or was denied
For role changes, both the previous role and new role are recorded so you can see exactly what changed.

How audit logging works

Audit events are recorded automatically whenever a tracked action occurs. There is nothing you need to enable or configure — logging begins as soon as your organization is on an enterprise plan. Events are written directly to the database as part of the same operation, so there is no delay between an action and its audit record. Audit logging is designed to never interfere with or slow down the action being performed.

Use cases

  • Compliance — demonstrate to auditors that your organization tracks access and security events
  • Incident response — investigate who changed a role, removed a member, or revoked an API key
  • Security monitoring — detect unusual login patterns or unauthorized impersonation
  • Change tracking — review when and why team membership or workflow configurations changed

Permissions

Only organization admins and owners can access audit logs.