Article Type: Concept
Audience: Enterprise Administrators
Module: Enterprise Admin - Access Control
Applies to Versions: All Versions
The Authentication Events screen provides Enterprise Administrators with comprehensive visibility into all authentication activities across the entire Fuuz Enterprise. This centralized security audit log captures every authentication attempt, API key generation, token verification, and identity provider interaction for all users, applications, and systems within your organization.
Authentication Events serve as the primary tool for security investigations, compliance auditing, troubleshooting user access issues, and monitoring potential security threats. All events are logged in real-time with 180-day retention and can be exported without row limits for external analysis or long-term archival.
Authentication Events are captured at the enterprise service mesh layer, ensuring comprehensive logging regardless of the authentication method, application, or entry point. Every authentication attempt generates an event record that includes timestamp, event type, status, user information, IP address (for external logins), identity provider, and failure reason (if applicable).
Events are logged synchronously in real-time, meaning that as soon as an authentication attempt completes, the event is immediately available in the Authentication Events screen. There is no batch processing delay or asynchronous logging queue that might delay event visibility.
| Event Type | Description | Triggered By |
|---|---|---|
| Authentication | Standard user login attempt via username and password | User login form submission |
| CompareSecret | Password verification during authentication | Login process, password change validation |
| GenerateAPIKey | Creation of new API key for programmatic access | User or administrator generating API key |
| Initialization | Initial authentication session establishment | First login, session creation |
| InvalidAuthentication | Failed authentication attempt with invalid credentials | Incorrect username or password |
| Recovery | Password reset or account recovery process | Forgot password workflow, account unlock |
| SetSecret | Password creation or change operation | Initial password setup, password change |
| TokenRefresh | JWT token renewal during active session | Automatic token refresh, session extension |
| VerifyApiKey | API key authentication validation | API request with API key credentials |
| VerifyToken | JWT token validation for authenticated request | Each authenticated API or UI request |
| VerifyTokenExpired | Detection of expired JWT token | Expired session, stale token usage |
Failure reasons are captured as free-text descriptions that provide specific detail about why an authentication attempt failed. Common failure reasons include:
Authentication failed: jwt expired - JWT token has exceeded its validity periodjwt expired - Shortened form indicating token expirationInvalid credentials - Username or password incorrectAccount locked - User account locked due to failed attemptsAPI key invalid - API key does not exist or has been revokedThe Fuuz Platform implements automatic account lockout protection to prevent brute force attacks. After 5 consecutive failed login attempts, the user account is automatically locked and cannot authenticate until an Enterprise Administrator manually unlocks the account through the Enterprise Users screen.
Scenario: Multiple failed login attempts detected from unfamiliar IP addresses
Investigation Steps:
Scenario: User reports inability to log in and receiving error messages
Troubleshooting Steps:
Scenario: Annual SOC 2 audit requires evidence of authentication monitoring and access control
Reporting Steps:
Scenario: Monitor API key authentication patterns to identify unusual usage or potential API key compromise
Monitoring Steps:
Scenario: Verify that OIDC or SAML identity provider integration is functioning correctly
Verification Steps:
Navigation Path:
Enterprise Admin Home → System → Access Control → Authentication Events
Required Permissions:
| Filter Field | Type | Description |
|---|---|---|
| Start Date / End Date | Date Range Picker | Filter events by date/time range; no maximum range limit; defaults to most recent events |
| Authentication Event Type | Dropdown (Multi-select) | Select one or more event types (Authentication, VerifyApiKey, TokenRefresh, etc.) |
| Authentication Event Status | Dropdown (Multi-select) | Filter by Success, Failure, or Incomplete status |
| Username | Free Text Search | Enter partial or full username for text matching; case-insensitive |
| User | Dropdown List | Select from list of known Enterprise Users; more precise than Username text search |
| Tenant (Application) | Dropdown (Multi-select) | Filter events by specific Application (also referred to as Tenant in some interfaces) |
| Identity Provider | Dropdown (Multi-select) | Filter by authentication provider (Internal, OIDC, SAML, or configured IdP names) |
| Initiated By User | Dropdown | Filter events initiated by specific user (useful for administrative actions) |
| User Api Key | Text Search | Search for events using specific API key identifier |
| Column | Content |
|---|---|
| Created At | Timestamp of authentication event (MM/DD/YYYY HH:MM AM/PM format) |
| Authentication Event Type | Specific event classification (11 types listed in Architecture section) |
| Authentication Event Status | Success, Failure, or Incomplete |
| Username | Username of the user attempting authentication |
| User | Full user display name or identifier from Enterprise User record |
| Tenant (Application) | Application name where authentication occurred |
| Role | Role associated with user authentication (if applicable) |
| Token Id | Unique identifier for the JWT token generated or verified |
| User Api Key | API key identifier used for authentication (for API requests) |
| IP Address | Source IP address for external authentication attempts (not captured for internal services) |
| Failure Reason | Free-text description of why authentication failed (only populated for Failure status) |
| Identity Provider | Authentication provider used (Internal, OIDC, SAML, or configured IdP name) |
Authentication Events can be exported to CSV or Excel formats for external analysis, archival, or integration with other systems. There are no row limits on exports - the system will export all records matching your current filter criteria regardless of volume.
Export Process:
Authentication Events are retained for 180 days from the date the event was created. After 180 days, events are automatically purged from the system. Organizations requiring longer retention periods should implement automated export workflows using Data Flows to archive authentication data to external systems or data warehouses.
All authentication events are logged synchronously in real-time. When an authentication attempt completes, the event record is immediately written to the authentication log and is instantly available in the Authentication Events screen. There is no batch processing delay or queuing mechanism that might defer event visibility.
This real-time architecture ensures that security investigations and troubleshooting activities have access to the most current authentication data without waiting for log processing cycles.
IP addresses are captured for all external authentication attempts initiated from client browsers or external API consumers. Internal service-to-service authentication (such as Gateway-to-Platform or scheduled Data Flow execution) does not capture IP addresses since these requests originate from within the platform infrastructure.
The IP Address field is valuable for identifying geographic patterns in authentication attempts, detecting suspicious login locations, and correlating failed authentication attempts from specific IP ranges that might indicate coordinated attacks.
Any identity provider configured for your Enterprise will appear in the Identity Provider column and filter options. This includes:
Each configured identity provider will display using the name assigned during the IdP configuration process, making it easy to filter and analyze authentication patterns by provider.
Administrators can establish automated alerting for authentication events using Data Flows. Common alerting patterns include:
Data Flows can also push authentication events to external systems including SIEM platforms, compliance databases, or ticketing systems for centralized security monitoring.
Authentication Events fulfill audit logging requirements for multiple compliance frameworks:
The real-time logging, comprehensive event capture, and exportability features ensure that Authentication Events meet the most stringent audit and compliance requirements across industries.
Enterprise Admin:
Security & Compliance:
Integration:
| Issue | Cause | Resolution |
|---|---|---|
| Cannot access Authentication Events screen | User does not have Enterprise Admin access type | Contact another Enterprise Administrator to grant Enterprise Admin access type to your user account |
| User reports locked out of account | 5 or more failed authentication attempts triggered automatic lockout | Review Authentication Events for the user to confirm lockout cause, then unlock account via Enterprise Users screen |
| Missing events from specific date range | Events older than 180 days have been automatically purged | Check external archival systems if automated exports were configured; otherwise data is permanently deleted |
| IP Address column blank for some events | Authentication originated from internal platform services | Expected behavior - IP addresses only captured for external authentication attempts; internal service authentication does not log IP |
| Export appears incomplete or missing rows | Filters were applied before export that limited results | Clear all filters and re-export to get complete dataset; verify date range covers desired period |
| Identity Provider shows "Internal" but user has SSO | User authenticated with username/password instead of SSO flow | Verify IdP configuration is correct; ensure user is accessing correct SSO login URL; user may be bypassing SSO |
| High volume of VerifyTokenExpired events | Token expiration settings too aggressive or browser caching issues | Review token lifetime settings; advise users to clear browser cache; check if IdP token expiration is properly configured |
| Unusual pattern of failed API key authentication | Compromised or expired API key being used | Revoke suspect API key immediately; review IP addresses for attack pattern; generate new API key; notify affected system owners |
| Cannot find specific user's authentication events | Username spelling incorrect or events outside 180-day retention | Verify correct username spelling; use User dropdown instead of Username text field for exact match; check date range |
| Version | Date | Editor | Description |
|---|---|---|---|
| 1.0 | 2025-12-29 | Craig Scott | Initial Release |