The Login Search page in the admin portal provides administrators with a powerful toolset for querying, filtering, and auditing user and device logins across all network access types. This is essential for support, compliance, and network security monitoring.
🔎 Search Preferences #
The search interface supports detailed filtering using the following fields:
-
MAC Address: Search by device hardware address.
-
Login Type: Choose from multiple authentication methods including:
-
Meeting Host
-
Conference
-
Self Provision by Email
-
SAML Access
-
Whitelisting
-
Quick Access
-
SMS
-
RADIUS
-
Username & Password
-
Event Access
-
Password
-
Each login type may reveal additional filters (e.g., email, name, description depending on the method).
-
Ticket Status: Toggle to show only logins with active tickets, which allows revocation if needed.
-
Online Status:
-
Devices that have been seen online
-
Devices that have NOT been seen online
-
-
Time Filter: Narrow results to logins seen during the last:
-
Minutes
-
Hours
-
Days
-
Months
-
Years
-
-
Site: Filter logins by site/location.
The Clear Search button resets all filters to default.
📄 Result Table – Logins Matching Criteria #
Once a search is performed, matching results are listed in a table with the following columns:
-
Type: Login method used.
-
When: Timestamp of the login event.
-
Information: Email, username or whitelist note, and whether it was via email or manually added.
-
Status: Icon indicating if the login is currently active or expired.
-
Valid Until: The expiration time for the login session or whitelist.
-
Last Seen: The last time this login was observed online.
-
Device: Clickable MAC or device ID associated with the login.
You can also:
-
Make report: Export a report based on the current search.
-
Use pagination: Browse through large datasets with paginated results.
🧠Example Use Cases #
-
Audit self-provisioned users during the last 24 hours.
-
Find stale whitelistings that are no longer used.
-
Track meeting host sessions per email address.
-
Revoke active login tickets for devices no longer authorized.
-
Filter out expired or never-used entries for cleanup.
This page is designed to be both comprehensive and fast, helping administrators maintain control and visibility over all authentication activity across the network.