HID RMS Auditing

The information related to the HID RMS authentication process is audited during the end-user authentication.

The following table describes the auditing data retrieved:

Code Name Description

MDT

malware_detection_type

Detailed Information on the risk detection

Copy

Example

eyJhbGciOiJub25lIn0.eyJzZXNzaW9uIjp7InNjb3JlIjo0OSwic3RhbmRhbG9uZV9zaWduYWxzIjpbeyJpZCI6IjdlMDQ4NDZlLTFmNTAtNDAxNS05YTViLTNjYzYxYjFhMjA1MCIsInR5cGUiOiJOT19GUF9BUlJJVkVEIn1dLCJkZXRlY3Rpb25zIjpbXX0sImFjdGlvbiI6eyJzY29yZSI6MCwic3RhbmRhbG9uZV9zaWduYWxzIjpbXSwiZGV0ZWN0aW9ucyI6W119LCJyaXNrIjoyMDYsInVzZXIiOnsic2NvcmUiOjcsInN0YW5kYWxvbmVfc2lnbmFscyI6W10sImRldGVjdGlvbnMiOltdfSwidGFncyI6W119

This data is visible in the Reporting > Audit Report details, in the indirectPrimaryAuthenticationUP parameter:

Copy

To read the MDT information, paste the JWT into a JWT decoder and view the result

{
    "session": {
        "score": 49,
        "standalone_signals": [
            {
                "id": "7e04846e-1f50-4015-9a5b-3cc61b1a2050",
                "type": "NO_FP_ARRIVED"
            }
        ],
        "detections": []
    },
    "action": {
        "score": 0,
        "standalone_signals": [],
        "detections": []
    },
    "risk": 206,
    "user": {
        "score": 7,
        "standalone_signals": [],
        "detections": []
    },
    "tags": []
}

This data is also visible in the Reporting > Audit Report details, in the rmsPushValidation parameters, (for example, when Mobile Push logon is used as a step-up authentication):