About Authentication Logs

This window displays information about successful authentication attempts involving cloud-based PPSK and RADIUS users, and users authenticating through a cloud-hosted captive web portal using either social log in credentials or a PIN. The authentication events displayed in the table appear for a time range that you define using start and end dates and times in the fields at the top of the window. Search for a specific client or user name in the Search field above the table.

The table displays the following information about successful network authentication attempts:

Note

Note

These entries are not real-time, but are historical records showing when individuals were authenticated. Entries are automatically deleted after seven days.

For information about how to download Authentication logs, see Download Log Information.