Reference Guide
Policy Management
Policy Tracking
3 min
the policy tracking menu allows kron pam users to monitor authentication and authorization the search algorithm deployed on this page can be used to search for specific users and user groups’ authorizations to specific devices or authentication methods on specific policies a search can be narrowed down by including more details like host information, device group name , etc authentication the authentication page shows policy based authentication logs used when connecting to devices 1 navigate to policy > policy tracking 2 open the authentication tab 3 fill in the fields to search and click enter authorization the authorization page shows policy based authorization logs used when executing commands on the target devices navigate to policy > policy tracking open the authorization tab fill in the fields to filter and click search vault permissions the vault permissions page displays the user, device, and account details associated with the permissions