Re-authentication logs

Prev Next

This document provides information about the Re-authentication logs report screen, which allows the administrator to view a report of all identity verification events triggered in Segura.

Requirements

Path to access

  1. On Segura, in the navigation bar, hover over the Products menu and select User Behavior.
  2. In the side menu, select Behavior analysis > Re-authentication logs.

Actions menu

Item Type Description
Actions Dropdown menu Displays the options Print report, Export CSV, and Schedule report.

Search fields

Item Type Description
ID Text field Filters re-authentication events by their unique identification code.
Trigger Dropdown menu Filters re-authentication events by the trigger that initiated them. The options are: View attempts at prohibited, Blocked commands, Session attempts at prohibited, High risk sessions, Rating drop, and Token TOTP. Clear the field to enable the All option. Note: events marked as TOTP Token are related to TOTP Token requests during login.
User Text field Filters re-authentication events by the user who re-authenticated.
Date Date picker Filters re-authentication events by the period in which they occurred.
Status Dropdown menu Filters re-authentication events by their status. Available options are Success and Failure. Clear the field to enable the All option.

Report fields

  • ID.
  • Trigger.
  • User.
  • Date.
  • Status.
  • Actions:
    • Details: opens the Re-authentication details screen that displays a report of the selected re-authentication event.
Info

By default, the report displays 30 records per screen. To go to the next screen, click the forward buttons at the end of the report.


Re-authentication details screen

This section provides information about the details screen that displays a report of the selected re-authentication event.

Item Description
Username Displays the Segura username associated with the re-authentication.
Status Displays the status of the re-authentication.
Trigger Displays the trigger that initiated the re-authentication.
Verification date Displays the date and time when the re-authentication was triggered.
Authentication method Displays the method used for re-authentication.
Browser Displays the browser used at the time of re-authentication.
IP Displays the IP address of the device where the re-authentication occurred.
Locale Displays the geographic location of the device.

Details section

This section of the screen will only contain records if the re-authentication status is Success. The fields displayed in this section will vary depending on the type of trigger that occurred.

Trigger: Rating drop

Item Description
Suspicious Events Event that caused the rating drop.
Date Date and time of the event.
Rating variation Score lost by the user due to the event.
Action Shortcuts to the Details and Session video screens.

Trigger: High-Risk Sessions

Item Description
Credential Credential used during the session.
Device Device used during the session.
Protocol Protocol executed during the session.
Proxy Type of proxy session.
Session ID Unique session identification code.
Start Session start time.
End Session end time.
Duration Duration of the session.
Action Shortcuts to the Session video, Session logs, Configure auditors, and Session text screens.

Trigger: Blocked commands

Item Description
Command Command executed during the session.
Criticality Session criticality.
Action during session Action performed during the session.
Session type Type of session.
Credential Credential used during the session.
Device Device used during the session.
Session ID Unique session identification code.
Start Session start time.
End Session end time.
Duration Duration of the session.
Action Shortcuts to the Session Video, Edit command, Session logs, Configure auditors, and Session text log screens.

Trigger: Session attempts at prohibited times and View attempts at prohibited times

Item Description
Credential Credential used during the access attempt.
Device Device used during the access attempt.
Day of the Week Day of the week when the access attempt occurred.
Attempt Date Date of the access attempt.
Time Time of the access attempt.