Exporting Identity Provider Logs

Last updated: 15 April 2026

Azure function implementation

If you have not done so already, please Setup to use the API to get started.

  • we have built a small javascript release that can be provided to an azure app function with the ability to configure the following:
ENV required description
IDP_ID yes This is the ID of the idp you would like to pull, use the api to find the relevant ID
STATE_TABLE_NAME yes This is an azure storage table’s name required to store the state of the last epoch checkpoint for each log pull run
STATE_TABLE_CONNECTION_STRING yes this is the connection information to the above storage table
API_HOST yes This is which federation manager server to use i.e https://manager.test.aaf.edu.au
API_KEY yes This is the api key you generated in the setup step
SENTINEL_DCE_BASE_URL yes This is the logs ingestion endpoint for your azure monitor data collection endpoint
SENTINEL_DCR_IMMUTABLE_ID yes This is the immutable ID of your data collection rule
SENTINEL_STREAM_NAME yes This is the stream name you would like the logs to appear as in sentinel

Simply provide the url of the latest release found at https://github.com/ausaccessfed/log_export_azure_function/releases, i.e https://github.com/ausaccessfed/log_export_azure_function/releases/download/v0.2.0/dist.zip to your azure app function and configure the environment variable listed above

upload source zip set environment variables

  • Once this is done you should be able to review the logs in the invocations tab of the cron function

Invocation overview

  • It should have an example output like the following

example output

  • If it does you should end up seeing your results in your sentinel instance in the provided SENTINEL_STREAM_NAME

Tutorial Complete!

You have completed this tutorial. Continue with the other tutorials in the Series or return to the tutorials home page.

Return Home