Reading heavily between the line: Depends on the applications being used to log in. Many 'three tier' applications use a common user for database access, bypassing any database level security and auditing capability. In those cases you would need to look at the application security logs. For properly behaving applications, look at the V$SESSION information - and hopefully the developers are familiar with the DBMS_APPLICATION_INFO package. On 21/05/2013 5:45 AM, Jeffrey Beckstrom wrote: > - > //www.freelists.org/webpage/oracle-l -- //www.freelists.org/webpage/oracle-l