Security & Authentication

You can configure LogScale to run with or without user authentication. Authorization and permissions are handled in LogScale, while users are authenticated and logged in using one of the following integrations:

Authentication in LogScale is by default single user. Authentication can also be turned off entirely.


It is strongly discouraged to opt for both single user and no authentication on production environments.

LogScale's cloud service has a per-customer configurable authentication mechanism. Enterprise Login enables:

  • administrators to configure an Identity Provider compatible with the Security Assertion Markup Language (SAML) for authentication.

  • users to login to the LogScale service using their Enterprise login and authentication.

Monitoring LogScale for security situations (hacker attempts, denial of service attacks, etc.), can be done with a number of different security monitoring systems, which can be integrated into LogScale: