Authentication Log | Log Reports

Log Reports

Efficiently Monitor Logs for Rapid Detection of Unauthorized Access

You can find and analyze the history of the authentication processing, as well as the history of the operations on the Administrator Site. Additionally, by quickly identifying unknown security-related activities, you can minimize the impact of unauthorized access.

Efficiently Monitor Logs for Rapid Detection of Unauthorized Access | Log Reports
Home Features Log Reports

What is a log?

Logging refers to the recording of history and information, or the records themselves. CloudGate UNO logs the authentication process and its results, as well as the history of operations on the administrator’s site.

Centralized management of all history

You can search and check the history of authentication processes performed via CloudGate UNO and the history of operations performed on the administrator’s site. This also minimizes damage from unauthorized access by quickly detecting security-related operations that the user does not remember.

What is a log? | Log Reports

Three points of Authentication log and Operation log

Quickly identify the cause of restricted access | Log Reports

Quickly identify the cause of restricted access

Quickly confirm unfamiliar operations and minimize damage from unauthorized acces | Log Reports

Quickly confirm unfamiliar operations and minimize damage from unauthorized acces

Operation log allows supervision of multiple system administrators | Log Reports

Operation log allows supervision of multiple system administrators

Authentication Log Icon | Log Reports
Authentication Logs: User Activity

User operations can be checked

The authentication log is a function that allows you to check the details of activity information such as sign-on, sign-off, and password changes for all users on the administrator site (CloudGate UNO Admin Site). You can search for activities by user and check the reasons for access restrictions, etc.

User operations can be checked | Log Reports
Service Detection Icon | Log Reports
Security Detection

Inform users about security-related changes

Security detection is a function that notifies users of security-related actions (activities) such as password changes and resets performed by users*. Appears in each user’s user hub and allows users to see activities they don’t know about.

System administrators are encouraged to take appropriate measures for each activity when a user inquires about an activity that they do not recognize.

* Security-related activity for the last 7 days will be notified on the user hub dashboard.

Inform users about security-related changes | Log Reports
Operation logs Icon | Log Reports
Operation log

Ability to check history of administrator site operations/program operations

In the operation log, you can check the history of operations on the administrator site (CloudGate UNO Admin Site). It is also possible to check the history of program operations (provisioning, synchronization, API access, certificates) associated with operations.

For companies with many administrators, the chief administrator can supervise other administrators and can be used as an audit log.

Ability to check history of administrator site operations/program operations | Log Reports

CloudGate UNO helps organizations implement a Zero Trust approach to security.

Contact us
CG Logo

A trademarked single sign-on service solution of International Systems Research Co. (ISR) that provides reliable and affordable strong authentication service for cloud services.

google partner badgegoogle partner badge
ISR LOGO

©1993 - 2024 International Systems Research Co. All Rights Reserved.