TOTPRadius - Remote syslog configuration options
System Logging Protocol (Syslog) is a way network devices can use a standard message format to communicate with a logging server.It was designed specifically to make it easy for administrators to monitor network devices, also review and manage those logs.
Starting from TOTPRadius v0.2.9, it is possible to send logs to a Remote syslog server. This can be configured in Settings → Remote syslog server
The syslog message contains information about user enrollment , authentication attempt, and admin’s activity . The server should be specified in IP_OR_FQDN:PORT format. Messages will be sent via UDP only. Set this value to "none" to disable the feature.
Message examples:
July 14, 2022, 02:33:56 token2 TOTPRadius; Radius authentication request from testuser01 ; Client IP: 192.168.0.104 July 14, 2022, 02:33:56 token2 TOTPRadius; Authentication attempt for testuser01 ; Return value: Reject July 14, 2022, 02:49:43 token2 TOTPRadius; Authentication attempt for testuser02 ; Return value: Accept July 14, 2022, 02:53:17 token2 TOTPRadius; Admin action: IP:192.168.0.104; admin/; table :users; action: insert July 14, 2022, 02:53:17 token2 TOTPRadius; Admin has added a user from the admin panel. Username: testuser03
Local syslog log file
Even if a remote syslog server is not specified, a copy of syslog messages is kept on the appliance locally. This log can be accessed from Settings → User actions log
About
Installation and configuration
- Installation and initial configuration
- Network configuration
- Migrating from older versions
- LDAP Configuration
- Azure AD Configuration
- Self-service enrollment portal
- Web and LDAPS Certificates
- Syslog configuration
- Single-factor authentication exceptions
- Slave appliance mode
- Dynamic RADIUS Attributes
Integration guides
Blog
21-11-2024
New iOS 18.1 Update Breaks Support for FIDO2.1 Final Keys
The latest iOS 18.1 release has introduced an unexpected issue affecting FIDO2.1 Final keys, rendering them incompatible with the new update. This issue is not limited to Token2's security keys but impacts devices from all manufacturers adhering to the FIDO2.1 final specification.
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.
04-09-2024
Update on EUCLEAK Vulnerability and Chip Security
We want to assure you that we do not use Infineon chips, which are affected by the EUCLEAK side-channel attack recently identified by NinjaLabs. This attack exploits a vulnerability related to the extended Euclidean algorithm (EEA) used in modular inversion.