Hi @Zinko,
I believe this must be logged by person B.
AFAIK, network drives are user-based. Just because you used person A credentials to establish VPN, person A is not used anymore anywhere. Person B is using already established tunnel to access its drives, and will use its own credentials to authenticate to those.
BR,
Milos