Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 7 Current »

Introduction

Tags beginning with auth.ping identify events generated by authentication services belonging to PingIdentity.

Valid tags and data tables

The full tag must have 4 levels. The first two are fixed as auth.ping. The third level identifies the type of events sent, and the fourth level indicates the event subtype. 

These are the valid tags and corresponding data tables that will receive the parsers' data:

Product / Service

Tag

Data table

PingFederate

auth.ping.federate.audit

auth.ping.federate.audit

auth.ping.federate.security_audit

auth.ping.federate.security_audit

auth.ping.federate.server

auth.ping.federate.server

PingID

auth.ping.id.mfa

auth.ping.id.mfa

For more information, read more About Devo tags.

How is the data sent to Devo?

Audit logs may be sent with the Devo relay. Example relay rule:

         Source message: 
            Source data: ^\d{4}-\d{2}-\d{2}\s\d{2}:\d{2}:\d{2},\d{3}\strackingid=
             Source tag: 
             Target tag: auth.ping.federate.audit
Sent without syslog tag: true

Table structure

These are the fields displayed in these tables:

  • No labels