Authentication Logs

View, filter, and sort authentication log entries. Download authentication log entries for any or all admin accounts.

This window displays information about successful authentication attempts involving cloud-based PPSK and RADIUS users, and users authenticating through a cloud-hosted captive web portal using either social login credentials or a PIN. The authentication events displayed in the table occurred during a time range that you define by start and end dates and times in the fields at the top of the window. You can also search for a specific client or user name in the Search field at the right top of the table.

Authentication Log Entries

The table on this window displays the following information about successful network authentication attempts:

Auth Status: The status of the authentication.

User Name: The name of the cloud-based PPSK or RADIUS user or the email address of a user authenticating through a cloud-hosted captive web portal.

SSID: The SSID associated with this authentication.

Auth Type: The method of authentication:

  • Private PSK
  • Enterprise (for RADIUS)
  • One of the social login options: Facebook, Google, LinkedIn
  • PIN

Client Device: The MAC address of the authenticated client device.

Reject Reason: The reason why an authentication attempt failed.

NAS Device: The MAC address of the AP running guest management and serving as the network portal.

NAS Identifier: The network name for the NAS device

Auth Date: The date of the authentication attempt.

  • The entries are not real-time but historical records showing when individuals were authenticated. These entries are automatically deleted after seven days.

Download Authentication Log Entries

If you are logged in as an admin with full access (administrator role), you can download the entire authentication log or just the entries pertaining to a specific admin, which is important for compliance with GDPR (General Data Protection Regulation). If administrators are EU citizens working in the EU, they have the right to access any PII (personally identifiable information) gathered about them. This includes personal information collected by ExtremeCloud IQ and contained in the authentication log. If an admin leaves their company and asks for this information, you can sort for the authentication log entries pertaining to that admin and download and save them in a .csv (comma-separated values) file.

  • It is also possible to delete authentication log entries for a specific admin. For information, see "Account Management".

To download individual admin authentication log entries:

  1. Select Download, select the name of the person requesting data from the Admin Name drop-down list in the dialog box, and then select OK.

ExtremeCloud IQ generates a file in CSV format.

  1. In the Files Ready for Download dialog box, select either the file_name.csv button or the Download button.

The file contains only authentication log entries for the chosen admin.

To download the complete authentication log, follow these steps but select All from the Admin Name drop-down list.

 


Cloud Terms of ServiceEvaluation AgreementData Privacy and Protection

Copyright ©  Extreme Networks, Inc. 6480 Via Del Oro, San Jose CA, 95119 USA