![]() |
Authentication Logs
View, filter, and sort authentication log entries. Download authentication log entries for any or all admin accounts.
Navigation
admin_name > Global Settings > Logs > Authentication Log
This window displays information about successful authentication attempts involving cloud-based PPSK and RADIUS users, and users authenticating through a cloud-hosted captive web portal using either social login credentials or a PIN. The authentication events displayed in the table occurred during a time range that you define by start and end dates and times in the fields at the top of the window. You can also search for a specific client or user name in the Search field at the right top of the table.
The table on this window displays the following information about successful network authentication attempts:
Auth Status: The status of the authentication.
User Name: The name of the cloud-based PPSK or RADIUS user or the email address of a user authenticating through a cloud-hosted captive web portal.
SSID: The SSID associated with this authentication.
Auth Type: The method of authentication:
Client Device: The MAC address of the authenticated client device.
Reject Reason: The reason why an authentication attempt failed.
NAS Device: The MAC address of the AP running guest management and serving as the network portal.
NAS Identifier: The network name for the NAS device
Auth Date: The date of the authentication attempt.
Note
The entries are not real-time but historical records showing when individuals were authenticated. These entries are automatically deleted after seven days.If you are logged in as an admin with full access (administrator role), you can download the entire authentication log or just the entries pertaining to a specific admin, which is important for compliance with GDPR (General Data Protection Regulation). If administrators are EU citizens working in the EU, they have the right to access any PII (personally identifiable information) gathered about them. This includes personal information collected by ExtremeCloud IQ and contained in the authentication log. If an admin leaves their company and asks for this information, you can sort for the authentication log entries pertaining to that admin and download and save them in a .csv (comma-separated values) file.
Note
It is also possible to delete authentication log entries for a specific admin. For information, see Account Management.To download individual admin authentication log entries:
ExtremeCloud IQ generates a file in CSV format.
The file contains only authentication log entries for the chosen admin.
To download the complete authentication log, follow these steps but select All from the Admin Name drop-down list.
Copyright © 2020 Extreme Networks. All rights reserved. Published March 2020.