The security log reflects the authentication history of users either across the cluster, or filtered according to domain, during a specified time period. These statistics allow you to diagnose and troubleshoot connection or authentication problems on a per-user basis.
User security data falls into these categories:
Category | Description |
---|---|
User | The user name |
Security Configuration | The security configuration to which the device user belongs |
Time | The time at which the authentication request took place |
Result | The outcome of the authentication request: success or failure |
Device ID | The device ID associated with the user |
Package | The package the user was attempting to access |
Domain | The domain the user was attempting to access |