Forum

  • even if machine authentication is used, the user logons can be tracked in ACS. not sure how users are tacked in the controller but if they can be watched via IP, then correlate the IP in the controller to the acs passed authentication log.

    I dont know if this is a valid solution, just trying to help and put some ideas out there.

Page 1 of 1
  • 1