Search results

The search results show the monitoring log details based on the search criteria. Results include event type, user ID, external entity name, session ID, browser, sign-in source, authentication method, MFA details, and event time.

These are available search results fields:

Field Description
Event Type These are event types:
  • Sign In
  • Sign Out
  • Time Out
  • Failed Sign In
User ID The user who performed the action. If a user GUID is displayed, then that external entity user has been deleted.
External Entity The name of the external entity in which the external entity user performed the authentication event.
Session ID The session when the action occurred.
User Agent The browser the user used during the event.
Sign In Source The authentication method the external entity user signed in with. This can be Infor CloudSuite Identities or Federated Identity.
Sign In Source ID These are authentication method types the external entity user sign in with:
  • Password - used when the external entity user signed in with an Infor CloudSuite Identity password.
  • Federated Identity entity ID - used when the external entity user signed in with a SAML 2.0 or OIDC federated identity.
  • Passkey - used when the external entity user signed in with an Infor CloudSuite Identity passkey.
  • Google - used when the external entity user signed in with their linked Google account.
  • LinkedIn - used when the external entity user signed in with their linked LinkedIn account.
MFA Shows if MFA was used during the sign-in or not. This can be true or false. If MFA is used, this is set to true. If MFA is not used, this is set to false.
MFA Type These are MFA authentication methods:
  • Email
  • TOTP
  • SMS
  • FIDO2
MFA Device The name of the MFA device used.
Time The time the authentication event occurred.