Monitoring UAC Authentication
Purpose
Use the monitoring functionality to view the UAC authentication page.
Action
To monitor UAC authentication, select Monitor>Security>Authentication>UAC Auth in the J-Web user interface.
Meaning
Table 221 summarizes key output fields in the UAC authentication page.
Table 221: UAC Authentication Monitoring Page
Field | Value | Additional Information |
---|---|---|
Filter by | Displays the UAC authentication value based on the selected filter. | – |
ID | Displays the authentication identification number. | – |
Source IP | Displays the IP address of the authentication source. | – |
User Name | Displays the name of the user. | – |
Age | Displays the idle timeout for the user. | – |
Role List | Displays the list of roles assigned to the username. | – |