Since all operation results other than password authentication are indicated as successful (OK), use ID and action to determine if any unauthorized actions were made.
Check the time of operation, and see if the user who operated the specific subject made any unauthorized actions.