The Authentication Logs table displays information about successful authentication attempts involving cloud-based PPSK and RADIUS users, and users authenticating through a cloud-hosted captive web portal using either social log in credentials or a PIN. The table includes authentication events for the time range that you define using the Start, End, and Time controls at the top of the page. Search for a specific client or user name in the Search field above the table.
The table displays the following information about successful network authentication attempts:
Note
To remove an existing login button that has already been deployed, you must resave the CWP and the Network Policy, and then redeploy the respective network policy to the device.Note
These entries are not real-time, but are historical records showing when individuals were authenticated. Entries are automatically deleted after seven days.Section contents: