Specifying unauthorized actions: actions other than password authentication

Since all operation results other than password authentication are indicated as successful (OK), use ID and action to determine if any unauthorized actions were made.

  • Check the time of operation, and see if the user who operated the specific subject made any unauthorized actions.