Policy Tracking
The Policy Tracking menu allows Kron PAM users to monitor Authentication and Authorization. The search algorithm deployed on this page can be used to search for specific users and user groups’ authorizations to specific devices or authentication methods on specific policies. A search can be narrowed down by including more details like Host Information, Device Group Name, etc.
The Authentication page shows policy-based authentication logs used when connecting to devices. 1. Navigate to Policy > Policy Tracking. 2. Open the Authentication tab. 3. Fill in the fields to Search and click Enter.
The Authorization page shows policy-based authorization logs used when executing commands on the target devices.
- Navigate to Policy > Policy Tracking.
- Open the Authorization tab.
- Fill in the fields to filter and click Search.
The Vault permissions page displays the user, device, and account details associated with the permissions.