Skip to main content

Event Descriptions

Each single captured Event is a result of a successful or failed attempt. Events appear in the Audit Trail, in the Control Center (CC) logs, in the HYPR Dashboard for Splunk, and in API call results.

Invisible Events

Not every Event is listed in the CC Audit Trail or HYPR Dashboard for Splunk; some only appear in HYPR Passwordless API responses or CC logs.

Event data is stored in a separate schema away from the critical HYPR FIDO databases. This allows registration, authentication, and deregistration flows to continue functioning without being affected. The connection information to this schema can be found in the Vault; a HYPR representative can help you find it. The settings for the Audit Trail schema will be automatically set up for you during installation.

We anticipate that potentially millions of records could exist in this database. We have included a means to roll over the data. This mechanism will be described in detail at the bottom of this guide.

eventTags

Most Events fall under one of the following eventTags categories; those that do not are listed last. Table listings under the following categories are sorted by the Action column.

A list of Event Parameters follows the event descriptions.

ACCESS_TOKEN (ADMIN) Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
ACCESS_TOKEN_CREATEADMIN
ACCESS_TOKEN
RELYING_PARTY_SERVEREndpoint API token creation request; this event is typically from the the browser token management UI.
ACCESS_TOKEN_REVOKEADMIN
ACCESS_TOKEN
RELYING_PARTY_SERVEREndpoint API token revoked.

tokenId=[token.id]
revokedBy=[user]

Back to Top

ADMIN Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
LOGINADMINCONTROL_CENTER_SERVERThe user logged in to Control Center.
LOGOUTADMINCONTROL_CENTER_SERVERLogout from Control Center web console.
FIDO2_METADATAADMINCONTROL_CENTER_SERVERFIDO2 metadata statement with AAGUID modified.

aaguid = [aaguid]
CREATE_INTEGRATIONADMINRELYING_PARTY_SERVERSuccessfully added an IdP integration.
DELETE_INTEGRATIONADMINRELYING_PARTY_SERVERSuccessfully deleted the IdP integration.
DISABLE_INTEGRATIONADMINRELYING_PARTY_SERVERSuccessfully disabled the IdP integration.
ENABLE_INTEGRATIONADMINRELYING_PARTY_SERVERSuccessfully enabled the IdP integration.
REFRESH_INTEGRATIONADMINRELYING_PARTY_SERVERSuccessfully refreshed the IdP integration.

OR

Failed to refresh the IdP integration.
SUSPEND_INTEGRATIONADMINRELYING_PARTY_SERVERSuccessfully suspended the IdP integration.
UPDATE_INTEGRATIONADMINRELYING_PARTY_SERVERSuccessfully updated the IdP integration details.
AUTHENTICATOR_DISABLEDADMINCONTROL_CENTER_SERVERThe authenticator was disabled for this rpAppId. Authentication requests using this authenticator will fail.

aaid=[aaid]
rpAppId=[appId]
AUTHENTICATOR_ENABLEDADMINCONTROL_CENTER_SERVERThe authenticator was enabled.

aaid=[aaid]
rpAppId=[rpAppId]
UAF_FACETID_ADDEDADMINCONTROL_CENTER_SERVERThe FIDO FacetID was added.
UAF_FACETID_REMOVEDADMINCONTROL_CENTER_SERVERThe FIDO FacetID was removed.
CREATE_APPADMINCONTROL_CENTER_SERVER
[rpAppId] was succesfully created.
CREATE_APP_ACTIONADMIN[Not Logged]An authentication or registration policy was created for [rpAppId].
DELETE_APPADMINCONTROL_CENTER_SERVERAssociated settings have been deleted.
DELETE_APP_ACTIONADMINCONTROL_CENTER_SERVERDelete action for [rpAppId].
DELETE_APP_CONFIGADMINRELYING_PARTY_SERVERRP Application configuration has been deleted.

config: [config.toStringTruncateValue()]
SAVE_APP_CONFIGADMINRELYING_PARTY_SERVERThe Application configuration was saved. One or more of the following changed:

- Theme color, logo, title, or messaging
- Push and/or QR enablement toggle
- Desktop SSO enablement toggle
- Timeout configuration
UPDATE_APPADMINCONTROL_CENTER_SERVER[rpAppId] was succesfully updated.
UPDATE_APP_ACTIONADMINCONTROL_CENTER_SERVERUpdate action for [rpAppId].
USERNAME_DISSOCIATEADMINRELYING_PARTY_SERVERAll associations with an email or alias have been deleted.
USERNAME_ASSOCIATEADMINRELYING_PARTY_SERVERThe username has been associated with [this].

Back to Top

AUTHENTICATION Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
DESKTOP_SSOAUTHENTICATION
WORKSTATION
RELYING_PARTY_SERVER
WORKSTATION
Desktop SSO started by web login attempt.
DESKTOP_SSO_COMPLETEAUTHENTICATIONRELYING_PARTY_SERVER
WORKSTATION
Desktop SSO completed by the workstation signing challenge.
EXTERNAL_AUTH_COMPLETEAUTHENTICATION (OOB | Browser | DM | Java SDK)
WORKSTATION
RELYING_PARTY_SERVERWorkstation [unlock | login] using [deviceType].
FALLBACK_AUTHENTICATORAUTHENTICATION
WORKSTATION
MobileDeviceFallback authentication has been [ enabled | disabled ]

.
FIDO_ONLY_AUTHAUTHENTICATION
MOBILE_DEVICE
UAF_SERVERFIDO authentication using the cryptographic key.
FIDO_ONLY_TRANSAUTHENTICATION
MOBILE_DEVICE
RELYING_PARTY_SERVER
FIDO2_WEBAUTHNAUTHENTICATION
MOBILE_DEVICE
RELYING_PARTY_SERVERA web authentication (webAuthn) attempt was made.
FIDO2_WEBAUTHN_COMPLETEAUTHENTICATION
MOBILE_DEVICE
RELYING_PARTY_SERVERWeb authentication (webAuthn) with [aaguid] was successful.

OR

Mobile device: Authentication as a platform authenticator or with a security key plugged into the mobile device. This is the use case where the browser running on the mobile device does WebAuthn with the Relying Party.
HYPR_GATEWAY_WORKSTATION_DRIVERAUTHENTICATION
WORKSTATION
WorkstationA workstation became able to communicate with a device capable of Enterprise Passkey Authentication.
HYPR_GATEWAY_AVAILABLEAUTHENTICATIONServerThe server is configured to accept a device and workstation Enterprise Passkey Authentication.
HYPR_MOBILE_DATABASEAUTHENTICATION
MOBILE_DEVICE
MobileDeviceThe mobile device is reporting information on registrations prior to an Enterprise Passkey Authentication.
OOB_WEBSITE_AUTHAUTHENTICATION (OOB | Browser | DM | Java SDK)
KEYCLOAK
RELYING_PARTY_SERVER
WEB
MobileDevice
The browser requests authentication from the HYPR server for the user.
A push notification is sent to the mobile device asking it to authenticate.
A sessionId is generated and returned as a part of the response.

Typical problems:

- Network conditions may create delays in receiving the push notification
OOB_WEBSITE_AUTH_COMPLETEAUTHENTICATION (OOB | Browser | DM | Java SDK)RELYING_PARTY_SERVERThe client polls the server periodically to check if the mobile authentication is successful.

The server returns the current status of authentication in the response message.
OOB_WEBSITE_TRANSAUTHENTICATION (OOB | Browser | DM | Java SDK)
MOBILE_DEVICE
RELYING_PARTY_SERVER
MobileDevice
The browser requested authentication for a step transaction from the HYPR server. The HYPR server sent a push notification to the mobile device, asking it to authenticate.
QR_FALLBACK_PAYLOAD_CACHEDAUTHENTICATIONCONTROL_CENTER_SERVERQR code was successfully cached for manual retrieval via QR Fallback deviceId=null, rpAppId=[rpAppId]
QR_FALLBACK_PAYLOAD_RETRIEVEDAUTHENTICATIONCONTROL_CENTER_SERVER
RELYING PARTY_SERVER
[Success] Cached payload was retrieved using the respective activation code associated with creation. \n \n[Failure] Failed to find QR fallback payload using activation code provided. Please check code entered and retry.
SESSION_WEBSITE_AUTHAUTHENTICATION
MOBILE_DEVICE
MobileDeviceAuthentication was attempted using a QR code.
SESSION_WEBSITE_AUTH_COMPLETEAUTHENTICATION[Not Logged]Authentication was completed using a QR code.
WEBSITE_AUTHAUTHENTICATIONMobileDeviceOperation/Authentication canceled/failed.
WORKSTATION_AUTHWORKSTATION_AUTH
AUTHENTICATION
MOBILE_DEVICE
WORKSTATION
RELYING_PARTY_SERVER
MobileDevice
Workstation
Start of the workstation unlock request from the device. This request is made when the user clicks the Unlock button in the HYPR App. A message is sent to the workstation to initiate unlock/login.
WORKSTATION_AUTH_COMPLETEWORKSTATION_AUTH
AUTHENTICATION
RELYING_PARTY_SERVERFinal confirmation that workstation unlock is successful.
Client and device top off the offline tokens.
WORKSTATION_AUTH_COMPLETEWORKSTATION_AUTHRELYING_PARTY_SERVERThe client has finished unlocking the workstation.
The login confirmation message reached the workstation. Completed.
WORKSTATION_AUTH_COMPLETEWORKSTATION_AUTHRELYING_PARTY_SERVERThe user has verified their physical presence at the workstation.
Generally, this involves pressing Ctrl+Alt+Delete.
UNIVERSAL_QR_SCANAUTHENTICATIONMobileDeviceOperation canceled. The HYPR barcode scan was aborted by the user.
WORKSTATION_AUTH_JSON_SCANAUTHENTICATION
MOBILE_DEVICE
MobileDeviceA mobile device was used to initiate a workstation lock or unlock event.
WORKSTATION_AUTH_QR_SCANAUTHENTICATION
MOBILE_DEVICE
[Not logged]A mobile device has been paired with a workstation via QR scan.

Back to Top

CREATE_USER, DELETE_USER Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
DELETE_USERDELETE_USERRELYING_PARTY_SERVER[userName] was deleted from the Control Center using the API token belonging to [userPerformingDelete].
[if no devices left]
[userName] has no remaining registrations after removing [deviceId]. Deleting the user record.
MAGIC_LINK_CREATE_USERADMIN
MAGIC_LINK
RELYING_PARTY_SERVER[userName] was invited to Control Center via magic link and email.

Back to Top

DEREGISTRATION Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
MOBILE_INITIATED_WEBSITE_DELETEDeleteRELYING_PARTY_SERVER
MobileDevice
A deregistration request was initiated from a mobile device for a website. The mobile user clicked on the Delete Web Account button.
MOBILE_INITIATED_WORKSTATION_DELETEDEREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVER
MobileDevice
A deregistration request was initiated from a mobile device for a workstation. The mobile user clicked on the Delete Computer button.
OOB_WEBSITE_INITIATED_DELETEDEREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVERA deregistration request was initiated from the web account or Control Center.
OOB_DEVICE_UNPAIRED
(was WORKSTATION_INITIATED_DELETE)
DEREGISTRATION
MOBILE_DEVICE
WORKSTATION
RELYING_PARTY_SERVER
Workstation
MobileDevice
A deregistration request was initiated from the workstation. The user clicked on the Delete Mobile Device button in the HYPR app on the computer.
FIDO_ONLY_DEREGDEREGISTRATION
MOBILE_DEVICE
UAF_SERVER
MobileDevice
WEB
FIDO registration is deleted. It can no longer be used to authenticate.
FIDO2_DEVICE_DEREGDEREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVERFIDO2 key [aaid] deleted for user [userName].
FIDO2_DEVICE_RESETDEREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVER[FIDO2 key [aaid] reset for user [userName].
MOBILE_INITIATED_WORKSTATION_UNPAIREDDEREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVERA deregistration request was initiated from a mobile device for a workstation. The mobile user clicked on the Delete Computer button.

Back to Top

ENDPOINT_API_ACCESS_TOKEN (ADMIN) Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
ENDPOINT_API_ACCESS_TOKEN_CREATEADMIN
ENDPOINT_API_ACCESS_TOKEN
RELYING_PARTY_SERVERThe endpoint API token was created.

Scope = [DEVICE | WORKSTATION]
tokenId = [truncated_token]
ENDPOINT_API_ACCESS_TOKEN_EXCHANGEADMIN
ENDPOINT_API_ACCESS_TOKEN
RELYING_PARTY_SERVERThe workstation install token was successfully exchanged.

tokenId=[truncated_token]
ENDPOINT_API_ACCESS_TOKEN_EXCHANGE_FAILEDADMIN
ENDPOINT_API_ACCESS_TOKEN
MOBILE_DEVICE
WORKSTATION
RELYING_PARTY_SERVER
MobileDevice
The workstation install token exchange failed.

tokenId=[truncated_token]
ENDPOINT_API_ACCESS_TOKEN_REVOKEADMIN
ENDPOINT_API_ACCESS_TOKEN
RELYING_PARTY_SERVERThe endpoint API token was successfully revoked.

tokenId=[token.id]
revokedBy=$user

Back to Top

ERROR Events

Event (eventName)ActionSource (eventLoggedBy)Description
(message)
EXCEPTIONERROR
KEYCLOAK
MOBILE_DEVICE
WORKSTATION
RELYING_PARTY_SERVERCaptures any oddities that may occur on the mobile, workstation, or web components.

Back to Top

FEATURE_FLAGS (ADMIN) Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
FEATURE_FLAG_TOGGLEADMIN
FEATURE_FLAGS
RELYING_PARTY_SERVERFeature Flag toggled.

Back to Top

IDENTITY VERIFICATION (IdV) Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
AFFIRM_APPLICATION_CONFIGURATION_CHANGEDIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm Configuration changed - [Onboarding | Recovery] flow.
AFFIRM_WORKFLOW_ATTESTATIONIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Attestation.
AFFIRM_WORKFLOW_ATTESTATION_OUTCOME_TYPEIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Outcome type.
AFFIRM_WORKFLOW_CHAT_ESCALATIONIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - chat escalation
AFFIRM_WORKFLOW_CONVERSATIONIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Conversation.
AFFIRM_WORKFLOW_DOCUMENT_UPLOADIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Document upload.
AFFIRM_WORKFLOW_EMAIL_CODE_SENTIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - code sent.
AFFIRM_WORKFLOW_FACE_MATCHIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Face match.
AFFIRM_WORKFLOW_IDV_FINISHIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - IDV finish.
AFFIRM_WORKFLOW_IDV_STARTIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - IDV start.
AFFIRM_WORKFLOW_INVITE_SENTIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - [Approver |Secondary Approver] invite sent.
AFFIRM_WORKFLOW_LOCATIONIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Location.
AFFIRM_WORKFLOW_PHONE_NUMBER_ENTEREDIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Phone number entered.
AFFIRM_WORKFLOW_RESULTIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Attestation.
AFFIRM_WORKFLOW_STARTEDIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Workflow started.
AFFIRM_WORKFLOW_TEXT_CODE_SENTIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Text code sent.
AFFIRM_WORKFLOW_TEXT_CODE_VERIFIEDIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Text code verified.
AFFIRM_WORKFLOW_VIDEOIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Video.
AFFIRM_WORKFLOW_VIDEO_APPROVER_ENABLEDIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Video Approver Enabled.
AFFIRM_WORKFLOW_VIDEO_REQUESTER_ENABLEDIDENTITY_VERIFICATIONRELYING_PARTY_SERVERAffirm workflow event - Video Requester Enabled.

Back to Top

KEYCLOAK Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
KEYCLOAK_ADMIN_EVENTAUTHENTICATION
KEYCLOAK
WEB[Variable JSON output.]
KEYCLOAK_POSSIBLE_BRUTE_FORCE_AUTH_ATTEMPTAUTHENTICATION (OOB | Browser | DM | Java SDK)
KEYCLOAK
WEBUsers latest authentication attempt triggered brute force detection. Will eventually block user temporarily if this keeps occuring.
KEYCLOAK_USER_EVENTAUTHENTICATION
KEYCLOAK
WEB[Variable JSON output.]
KEYCLOAK_USER_TEMPORARILY_DISABLEDAUTHENTICATION (OOB | Browser | DM | Java SDK)
KEYCLOAK
RELYING_PARTY_SERVERuser: REDACTED is temporarily disabled by brute force detection

Back to TopBack to Top

Event (eventName)ActionSource (eventLoggedBy)Description (message)
MAGIC_LINK_CREATEMagic LinksCONTROL_CENTER_SERVER
RELYING_PARTY_SERVER
Magic link created.
MAGIC_LINK_DELETEADMIN
MAGIC_LINK
CONTROL_CENTER_SERVERDeleting pending magic links for:

username=[userName]
rpAppId=[rpAppId]
MAGIC_LINK_EXP_DELETE_EXISTING_AFTER_NEWADMIN
MAGIC_LINK
CONTROL_CENTER_SERVERDeleting existing magic links after creating new a one for the same username.
MAGIC_LINK_EXP_DELETED_EXISTINGADMIN
MAGIC_LINK
CONTROL_CENTER_SERVERPre-existing magic links have been deleted. Only one magic link can be alive at a given time.
MAGIC_LINK_EXP_RESEND_EMAIL_MSG_TO_HAASADMIN
MAGIC_LINK
CONTROL_CENTER_SERVERAn invitation email has been generated and sent to [userName].
MAGIC_LINK_EXP_USERNAME_NOT_FOUNDADMIN
MAGIC_LINK
CONTROL_CENTER_SERVERUsername not found. Unable to resend an email to HYPR with a new magic link message.
MAGIC_LINK_EXPIRED_OR_USEDADMIN
MAGIC_LINK
RELYING_PARTY_SERVERThis magic link is invalid or has expired.
MAGIC_LINK_NOT_FOUNDADMIN
MAGIC_LINK
CONTROL_CENTER_SERVERCannot find a magic link for the token given. Verify that the token is correct and try again.
MOBILE_DYNAMIC_LINK_USEDAUTHENTICATION
REGISTRATION
MOBILE_DEVICE
MobileDeviceFirebase from app open.
HYPRLink from HYPR scan.
Firebase from HYPR scan.

Back to Top

MISCELLANEOUS Events (no eventTags)

Event (eventName)ActionSource (eventLoggedBy)Description (message)
WESBITE_AUTHAUTHENTICATIONMobileDeviceOperation failed. Your request to authenticate this device didn't complete in time. Fingerprint timeout reached. Try again.
MOBILE_CERTIFICATE_REENROLLMENTREGISTRATION
MOBILE_DEVICE
WORKSTATION
RELYING_PARTY
Workstation
MobileDevice
The certificate was re-issued by the enrollment service.
DEFAULTCore System[Not Logged]A default entry for anomalous events.
UNKNOWNCore System[Not Logged]EventName= [name] is not known to this version of the server. The event may have been introduced in a newer version of the server.
LOG_SUBMISSIONERRORCONTROL_CENTER_SERVER
RELYING_PARTY_SERVER
[clientType] client logs were submitted successfully. OR
[clientType] client logs were submitted successfully by [userName]. OR
WINDOWS client logs were submitted successfully by [machineUserName].
AUTH_DENIED_LOW_VERSIONERROR
REGISTRATION
[Not Logged]Authentication was denied due to a prohibitively low version of Control Center.
REG_DENIED_LOW_VERSIONERROR
REGISTRATION
[Not Logged]Registration was denied due to a prohibitively low version of Control Center.
MOBILE_INITIATED_WORKSTATION_LOCKWorkstation-related[Not Logged]The mobile device initiated a workstation lock action.

Back to Top

OFFLINE_ACCESS Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
OFFLINE_TOKEN_ACCESSWorkstation-relatedMobileDeviceOffline token access request.
OFFLINE_TOKEN_AUTHWorkstation-relatedWorkstationAuthentication using Offline Mode. A mobile app user used an Offline Mode PIN to login to the workstation.

Back to Top

POV Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
MOBILE_DYNAMIC_LINK_USEDAUTHENTICATION
REGISTRATION
MOBILE DEVICE
RELYING_PARTY_SERVER[ HYPRlink | Firebase] from [ hypr scan | app open ].
POV_EXPIRATION_CLEAREDPOVRELYING_PARTY_SERVERPOV expiration has been cleared.
POV_EXPIRATION_SETPOVRELYING_PARTY_SERVERPOV has been set to expire on [friendlyDate].

Back to Top

RADIUS Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
RADIUS_CLIENT_CREATERADIUSCONTROL_CENTER_SERVERThe Radius server client was created.

id=[radiusClientId]
RADIUS_CLIENT_DELETERADIUSCONTROL_CENTER_SERVERThe Radius server client was deleted.

id=[radiusClientId]
RADIUS_CLIENT_UPDATERADIUSCONTROL_CENTER_SERVERThe Radius server client was updated.

id=[radiusClientId]
RADIUS_CONFIG_CREATERADIUSCONTROL_CENTER_SERVERThe Radius server configuration was created.

id=[configCreated.radiusConfigId]
RADIUS_CONFIG_DELETERADIUSCONTROL_CENTER_SERVERThe Radius server configuration was deleted.

id=[radiusConfigId]
RADIUS_CONFIG_UPDATERADIUSCONTROL_CENTER_SERVERThe Radius server configuration was updated.

id=[updatedConfig.radiusConfigId]
RADIUS_INTEGRATION_CREATERADIUSCONTROL_CENTER_SERVERThe Radius integration was created.

id=[createdIntegration.id]
RADIUS_INTEGRATION_DELETERADIUSCONTROL_CENTER_SERVERThe Radius integration was deleted.

id=[radiusIntConfigId]
RADIUS_ONBOARDEDRADIUSCONTROL_CENTER_SERVERRadius integration onboarded.

id=[newIntegration.id]
RADIUS_SERVER_CREATERADIUSCONTROL_CENTER_SERVERThe Radius server was created.

id=[createdServer.radiusServerId]
RADIUS_SERVER_DELETERADIUSCONTROL_CENTER_SERVERThe Radius server was deleted.

id=[radiusServerId]
RADIUS_SERVER_UPDATERADIUSCONTROL_CENTER_SERVERThe Radius server was updated.

id=[radiusServerId]
radiusConfigId=[radiusServer.radiusConfigId]

Back to Top

RECOVERY_PINS (ADMIN) Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
RECOVERY_PIN_AUTHADMIN
RECOVERY_PINS
WORKSTATION
WorkstationAuthorization was attempted using a recovery PIN.
RECOVERY_PIN_REVEALADMIN
RECOVERY_PINS
CONTROL_CENTER_SERVER
RELYING_PARTY_SERVER
The recovery PIN was revealed via either the CC Admin UI or an API call.
RECOVERY_PINS_DELETEADMIN
RECOVERY_PINS
WORKSTATION
[Not Logged]The recovery PIN was deleted. HYPR recommends generating new recovery PINS.
RECOVERY_PINS_GENERATEDADMIN
RECOVERY_PINS
RELYING_PARTY_SERVERThe recovery PIN has been saved.
RECOVERY_PINS_RE_GENERATEDADMIN
RECOVERY_PINS
WORKSTATION
RELYING_PARTY_SERVERThe recovery PINs have been re-saved.
RECOVERY_PINS_SETUPADMIN
RECOVERY_PINS
[Not Logged]Recovery PINS were created.

Back to Top

REGISTRATION Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
FIDO_ONLY_REGREGISTRATION
MOBILE_DEVICE
UAF_SERVER
MobileDevice
WEB
FIDO registration.

The registration policy is supplied by the server. The device generates a cryptographic key pair, then sends the public key to the server. The user provides a second factor (touch/PIN/native/etc.) to safeguard the key.

Typical problems:
- The Application's policy(-ies) is not configured properly in Control Center
- The authenticator specified by the policy is not available on the phone
FIDO2_DEVICE_REGREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVERUser [userName] initiated FIDO2 key registration.
FIDO2_DEVICE_REG_COMPLETEREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVERA successful platform or security key registration was attempted on a mobile device. The browser running on the mobile device used WebAuthn with the Relying Party.

Success: FIDO2 key registered

Failure: Session not found for challenge , [expired | false]. Please contact HYPR customer support and report this issue. ExceptionId:
OOB_DEVICE_REGREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVER
MobileDevice
The device scans the QR code and sends starts the registration process. A sessionId is generated and returned as a part of the response. The initial handshake between the client (browser/workstation) is now complete.

Typical problems:
- PIN mismatch due to a timeout
- Multiple scans of the same QR code
OOB_DEVICE_REG_COMPLETEREGISTRATIONRELYING_PARTY_SERVERThe device QR scan registration process is complete.
OOB_DEVICE_PAIRED
(was OOB_DEVICE_REG_COMPLETE)
REGISTRATIONRELYING_PARTY_SERVERThis is the final step in the registration process. Confirmation was received from the Device. The device registration record has been saved.
OOB_DEVICE_PAIRED
(was OOB_DEVICE_REG_COMPLETE)
REGISTRATIONRELYING_PARTY_SERVERThe device started registration successfully. The PIN has been matched successfully. The Relying Party connection is OK. The device can now proceed to attempt a FIDO registration.
OOB_DEVICE_PAIRED
(was OOB_DEVICE_REG_COMPLETE)
REGISTRATIONRELYING_PARTY_SERVERA successful FIDO authentication was completed on a mobile device. Use traceId to match this event with the WORKSTATION_AUTH authentication start.

traceId=[traceId]
OOB_GET_REG_DEVICESREGISTRATIONRELYING_PARTY_SERVERListing request for mobile devices or security keys registered to the user.
OOB_WEBSITE_REGREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVER
MobileDevice
WEB
The opening registration request from the browser or workstation. The client now waits for the mobile to scan QR. Started.
OOB_WEBSITE_REGREGISTRATIONRELYING_PARTY_SERVER
MobileDevice
WEB
The client setup is complete. The sessionId is returned to the client

This indicates that the device has finished enrolling the user key pair. Registration is not yet complete.
OOB_WEBSITE_REGREGISTRATION
MOBILE_DEVICE
RELYING_PARTY_SERVER
MobileDevice
WEB
The opening registration request call from the browser or workstation. The client now waits for the mobile device to scan a QR code.

Typical problems:
- The Application is not setup in Control Center
- The HYPR license is invalid
OOB_WORKSTATION_REGREGISTRATIONRELYING_PARTY_SERVER
MobileDevice
Workstation
FIDO registration was started.
SMARTKEY_ENROLLREGISTRATION
WORKSTATION
RELYING_PARTY_SERVER
Workstation
Enrolling the security key.

enrollmentRequest=[req]
SMARTKEY_ENROLL_COMPLETEREGISTRATIONRELYING_PARTY_SERVERSecurity key enrollment succeeded.

Back to Top

RISK_ENGINE Events

Event (eventName)ActionSource (eventLoggedBy)Description
(message)
ADAPT_CREATE_POLICYADAPT
AUTHENTICATION
CONTROL_CENTER_SERVERCreated new Adapt authentication policy for this tenant.
ADAPT_DELETE_POLICYADAPT
ADMIN
RISK_ENGINE (AUTHENTICATION)
CONTROL_CENTER_SERVERDeleted an Adapt authentication policy for this tenant.
ADAPT_LOGGING_ONLY_POLICY_EVALUATIONADAPT
AUTHENTICATION
CONTROL_CENTER_SERVERAdapt policy evaluation was successful for evaluationPoint=, policyName=, policyId=, message=
ADAPT_POLICY_ASSIGNMENTADAPT
ADMIN
RISK_ENGINE
CONTROL_CENTER_SERVERUpdated Adapt policy assignment for evaluationPoint=* to policyId= with adaptUnavailableFallback=[STANDARD | QR_ONLY | BLOCKED].
ADAPT_POLICY_ASSIGNMENT_REMOVEDADAPT
ADMIN
RISK_ENGINE
CONTROL_CENTER_SERVERRemoving Adapt policy assignment for evaluationPoint=.
ADAPT_POLICY_ASSISTADAPT
ADMIN
RISK_ENGINE
CONTROL_CENTER_SERVERRequest for policy assistance was made for policyId=[policyId], policyName=[policyName].
ADAPT_POLICY_EVALUATIONADAPT
AUTHENTICATION
CONTROL_CENTER_SERVERAdapt policy evaluation was successful for , rpAppId=, traceId=<traceId, if applicable; may be empty>.
ADAPT_POLICY_EVAL_USER_ALLOWLISTEDADAPT
ADMIN
RISK_ENGINE
CONTROL_CENTER_SERVERUser=, rpAppId=[rpAppId] has been allowlisted from Policy Evaluation by adminUser=
ADAPT_POLICY_EVAL_USER_BLOCKEDADAPT
ADMIN
RISK_ENGINE
CONTROL_CENTER_SERVERThe limit for allowed login failures was exceeded. OR
Accompanies a 403 status code.
ADAPT_POLICY_UNASSIGN_DELETED_POLICYADAPT
ADMIN
RISK_ENGINE
CONTROL_CENTER_SERVERRemoved Adapt policy assignments evaluationPoints= to policyId= because the policy has been deleted.
ADAPT_UPDATE_POLICYADAPT
ADMIN
RISK_ENGINE
CONTROL_CENTER_SERVERUpdate an Adapt authentication policy for this tenant.

Back to Top

SETTINGS Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
SSL_PINS_UPDATEDADMIN
MOBILE_DEVICE
WORKSTATION
MobileDevice
Workstation
SSL pins have been synched across HYPR.

[Fail] Error updating SSL pins: Operation failed
UPDATE_SERVER_GLOBAL_CONFIGADMINRELYING_PARTY_SERVERSupport email has been updated. Support display name has been updated.

OR

Support email has been deleted.
FIDO2_POLICYSETTINGSRELYING_PARTY_SERVERUpdated FIDO2 policy.
FIDO2_SETTINGSSETTINGSRELYING_PARTY_SERVER[Client origin URL] has been [ enabled | disabled ]

Back to Top

SIGNAL Events

Event (eventName)ActionSource (eventLoggedBy)Description
(message)
DEVICE_SIGNAL_RECEIVEDSIGNALRELYING PARTY_SERVERSuccessfully posted the device security state.
WORKSTATION_SIGNAL_RECEIVEDSIGNALRELYING_PARTY_SERVERSuccessfully posted the workstation security state.
BROWSER_SIGNAL_RECEIVEDSIGNALBROWSERSuccessfully posted the browser security state.

Back to Top

SMART_KEY Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
SMARTKEY_CC_INITIATED_UNENROLLSMART_KEY
WORKSTATION
RELYING_PARTY_SERVERThe security key was unenrolled from Control Center. Please remove the certificate from the Certificate Authority using the following command:

certutil -revoke ${req.smartKeyCertificateSerialNumber} 8
SMARTKEY_PIN_CHANGESMART_KEY
WORKSTATION
WorkstationAn attempt was made to change the security key PIN.
SMARTKEY_PIN_VERIFICATIONSMART_KEY
WORKSTATION
WorkstationThe security key PIN was verified.
SMARTKEY_WORKSTATION_INITIATED_UNENROLLSMART_KEY
WORKSTATION
RELYING_PARTY_SERVER
Workstation
The security key was unenrolled from the workstation. Please remove the certificate from the Certificate Authority using the following command:

certutil -revoke ${req.smartKeyCertificateSerialNumber} 8
SMARTKEY_AUTHSMART_KEY
WORKSTATION
[Not Logged]Authentication was attempted on a workstation using a security key.
SMARTKEY_AUTH_COMPLETESMART_KEY
WORKSTATION
WorkstationAuthentication was completed using a security key.
SMARTKEY_PIN_PUK_CHANGESMART_KEY
WORKSTATION
[Not Logged]A PIN Unblocking Key (PUK) for a smart key has been changed.
SMARTKEY_PIN_PUK_VERIFICATIONSMART_KEY
WORKSTATION
[Not Logged]A PIN Unblocking Key (PUK) for a smart key has been verified as part of a PIN reset.
SMARTKEY_RECOVERY_PINS_RE_GENERATEDADMIN
RECOVERY_PINS
SMART_KEY
[Not Logged]Recovery pins re-saved.
SECURITY_KEY_PUK_READSMART_KEYWhen the cc/api/securitykey/getpinreset endpoint is called.
SECURITY_KEY_PUK_UPDATESMART_KEYWhen the cc/api/securitykey/updaterecovery endpoint is called with a Workstation Installation token. This event is generated whether the update is successful or not, and will contain the old and new values.
SECURITY_KEY_PUK_CREATESMART_KEYA new PUK record has been created.

Back to Top

SUPPORT_ACCESS Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
SUPPORT_ACCESS_ENABLEDSUPPORT_ACCESSRELYING_PARTY_SERVERHYPR Support access enabled.
SUPPORT_ACCESS_DISABLEDSUPPORT_ACCESSRELYING_PARTY_SERVERHYPR Support access disabled.
SUPPORT_ACCESS_EXPIRATION_DATE_CHANGEDSUPPORT_ACCESSRELYING_PARTY_SERVERHYPR Support access expiration date set.
SUPPORT_ACCESS_EXPIRATION_DATE_EXCEEDED_BLOCKING_ACCESSSUPPORT_ACCESSRELYING_PARTY_SERVERBlocked HYPR Support access due to expiration date exceeded.
SUPPORT_ACCESS_NEW_EXPIRATION_DATE_APPLICABLE_ENABLING_ACCESSSUPPORT_ACCESSRELYING_PARTY_SERVEREnabled HYPR Support access due to expiration date no yet exceeded.
SUPPORT_ACCESS_ADDED_EMAILS_TO_ALLOW_LISTSUPPORT_ACCESSRELYING_PARTY_SERVEREmail added to list.
SUPPORT_ACCESS_REMOVED_EMAILS_FROM_ALLOW_LISTSUPPORT_ACCESSRELYING_PARTY_SERVEREmail removed from list.
SUPPORT_ACCESS_ALLOWANCE_CHANGED_FROM_ALLOW_LIST_TO_ALLSUPPORT_ACCESSRELYING_PARTY_SERVERAll HYPR employees are allowed to have access.
SUPPORT_ACCESS_ALLOWANCE_CHANGED_FROM_ALL_TO_ALLOW_LISTSUPPORT_ACCESSRELYING_PARTY_SERVEROnly HYPR employees on the list are allowed to have access.
SUPPORT_ACCESS_EXPIRATION_DATE_ENABLEDSUPPORT_ACCESSRELYING_PARTY_SERVERChanged from indefinite access to expiration date.
SUPPORT_ACCESS_EXPIRATION_DATE_DISABLEDSUPPORT_ACCESSRELYING_PARTY_SERVERChanged from expiration date to indefinite access.
SUPPORT_ACCESS_DENIED_TENANT_ACCESS_ATTEMPT_EXPIRATION_DATE_EXCEEDEDSUPPORT_ACCESSRELYING_PARTY_SERVERDenied HYPR Support access - expiration date exceeded.
SUPPORT_ACCESS_SUCCESSFUL_TENANT_ACCESS_ATTEMPTSUPPORT_ACCESSRELYING_PARTY_SERVERSuccessful HYPR Support tenant access.
SUPPORT_ACCESS_DENIED_TENANT_ACCESS_ATTEMPT_UNAUTHORIZEDSUPPORT_ACCESSRELYING_PARTY_SERVERDenied HYPR Support access - unauthorized.
SUPPORT_ACCESS_DENIED_TENANT_ACCESS_ATTEMPT_SUPPORT_ACCESS_DISABLEDSUPPORT_ACCESSRELYING_PARTY_SERVERDenied HYPR Support access - access disabled.
SUPPORT_ACCESS_MAGIC_LINK_SESSION_EXPIREDSUPPORT_ACCESSRELYING_PARTY_SERVERHYPR Support Magic Link session expired.

Back to Top

SYSTEM_CHECK Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
BATCH_DB_UPDATESYSTEM_CHECKCONTROL_CENTER_SERVERThe background process to update the database failed; contact your administrator immediately.
DB_CRYPTO_VALIDATION_PROBLEMSYSTEM_CHECKCONTROL_CENTER_SERVERThe database data integrtity check failed. Data has potentially been tampered with.
Check affected user activity in the Audit Trail and Logs for suspicious authentication attempts. Try to register again.
FIDO_CERT_EXPIRY_CHECKSYSTEM_CHECKRELYING_PARTY_SERVERCertificate Expiration Notice.
FIDO certificates are monitored for expiry based on days remaining:

< 90 = High Criticality
90 - 150 = Medium Criticality
> 150 = Low Criticality

If the event is not logged as success=false, it passed the check.
LICENSE_VALIDATION_PROBLEMSYSTEM_CHECKRELYING_PARTY_SERVERINVALID_LICENSE: Details: Please upload a HYPR license key with a valid domain. Creating and updating RP applications will not be permitted until a valid license is uploaded.
MOBILE_CERT_RENEWAL_EXPIRY_CHECKSYSTEM_CHECK
MOBILE_DEVICE
RELYING_PARTY_SERVER
MobileDevice
Certificate Expiration Notice.
Mobile device certificates are monitored for expiry based on days remaining:

< 90 = High Criticality
90 - 150 = Medium Criticality
> 150 = Low Criticality

If the event is not logged as success=false, it passed the check.
UAF_CERT_EXPIRY_CHECKSYSTEM_CHECKRELYING_PARTY_SERVERCertificate Expiration Notice.
UAF certificates are monitored for expiry based on days remaining:

< 90 = High Criticality
90 - 150 = Medium Criticality
> 150 = Low Criticality

If the event is not logged as success=false, it passed the check.

Back to Top

WEB_REGISTRATION Events

Event (eventName)ActionSource (eventLoggedBy)Description (message)
MOBILE_CANCELLED_NEW_CERTIFICATEWEB_REGISTRATIONRELYING_PARTY_SERVERMobile cancelled workstation certificate processing.
MOBILE_CONFIRMED_CERTIFICATE_RENEWALWEB_REGISTRATION[Not Logged]The mobile device's certificate renewal is complete.
MOBILE_CONFIRMED_NEW_CERTIFICATEWEB_REGISTRATIONRELYING_PARTY_SERVERThe mobile device confirms workstation certificate processing.
MOBILE_NOTIFIED_OF_CERTIFICATE_RENEWALWEB_REGISTRATION[Not Logged]The mobile device was informed of successful certificate renewal.
MOBILE_NOTIFIED_OF_NEW_CERTIFICATEWEB_REGISTRATIONRELYING_PARTY_SERVERThe mobile device has been notified of the workstation certificate's availability.
WORKSTATION_CERTIFICATE_ISSUEDWEB_REGISTRATIONRELYING_PARTY_SERVERThe certificate was issued by the enrollment service.
WORKSTATION_CERTIFICATE_REQUESTEDWEB_REGISTRATIONRELYING_PARTY_SERVERA certificate request has been queued up for the Enrollment service.
WORKSTATION_CERTIFICATE_REVOKEDWEB_REGISTRATION[Not Logged]The workstation certificate was revoked.
WORKSTATION_ENROLLEDWEB_REGISTRATIONRELYING_PARTY_SERVERWorkstation enrolled.

[machineName]

Back to Top

WORKSTATION and WORKSTATION_STATE Events

Event (eventName)ActionSource (eventLoggedBy)Description
(message)
WORKSTATION_CONFIGURATIONWORKSTATION_STATE
WORKSTATION
[Not Logged]The workstation was configured successfully.
WORKSTATION_INSTALL_TOKENWORKSTATION_STATE
WORKSTATION
WorkstationFailed to exchange install token.
Exception during install exchange.
WORKSTATION_LOCKWORKSTATION_STATE
MOBILE_DEVICE
RELYING_PARTY_SERVER
Workstation
A request was issued to lock the workstation. [deviceId(deviceIdParam)]
WORKSTATION_SOCKET_CONNECTWORKSTATION_STATE
WORKSTATION
WorkstationThe workstation web socket was connected.
WORKSTATION_SOCKET_DISCONNECTWORKSTATION_STATE[Not Logged]The workstation web socket was disconnected.
WORKSTATION_SHUTDOWNWORKSTATION_STATE
WORKSTATION
[Not Logged]The workstation was shut down. Usually this indicates the user powered off or rebooted the computer.
WORKSTATION_STARTUPWORKSTATION_STATE
WORKSTATION
[Not Logged]The workstation was started. Usually this indicates the user powered on or rebooted the computer.
WORKSTATION_UPGRADEWORKSTATION_STATE
WORKSTATION
[Not Logged]The workstation was upgraded.

Back to Top

Event Parameters

Each Event will provide the following parameters, data permitting.

Event Data Model Parameters vs. Log Parameters

Labels in plain text are directly from the Event Data Model, while those in italics are generated for the logs and may be used in the Audit Trail and HYPR Dashboard for Splunk.

ParameterDescription
additionalDetailsA map of discretionary data supplied for an Event; used to capture attributes not available in the Event object.
authenticatorAuthenticator GUID/ID logged with the following Events:

GUID for FIDO2 Authentication
FIDO2_DEVICE_DEREG
FIDO2_WEBAUTHN_COMPLETE
FIDO2_DEVICE_REG_COMPLETE


ID for UAF
FIDO_ONLY_AUTH
FIDO_ONLY_DEREG
FIDO_ONLY_REG


Authenticator Type for the following Events:

Biometric or PIN for Security Key Desktop Authentication
SMARTKEY_AUTH_COMPLETE
errorCodeThe HYPR Error code associated with the Event, if any. This value must be populated if isSuccessful=false.

See also HYPR Error Codes Troubleshooting Tables.
errorSeverityThe impact level of the Event causing the error.

Possible Values: WARN, ERROR, FATAL, null (default)
eventLoggedByThe component which logged the Event. Success Events are mostly (but not necessarily) logged by the server. Failure Events are sent by the
HYPR Mobile App, HYPR Passwordless, or HYPR SDK if something goes wrong.

Possible Values: MobileDevice, RELYING_PARTY_SERVER, CONTROL_CENTER_SERVER, Web, Workstation, Browser, UAF_SERVICE, ENROLLMENT_SERVICE
eventNameThe name of the Event.
eventTimeInUTCThe time of the Event in UTC format.
fidoUserA machine-readable user handle representing a FIDO registration.
idUnique identifier for the Event.
integrationProviderThe type of integration provider for the Event, based on the rpAppId.

AZURE_AD, BEYOND_TRUST, FORGE_ROCK, GOOGLE, OKTA, ONELOGIN, OPENID_CONNECT, PING_DAVINCI, PING_ID, RADIUS
integrationTypeThe type of integration upon which the Event occurs.

Possible values: IDP, EAM, FIDO2
isSuccessfulStatus of the individual Event.

Possible values: true, false
loggedTimeInUTCThe time the server logged the Event in UTC format.
machineUserNameHYPR name for the user generating the Event. Typically associated with fidoUser.
messageA message giving a brief recount of the Event.
remoteIPThe IP address of the node submitting the Event.

Sourced from the X-Forwarded-For HTTP header in the request.
rpAppIdThe camel case unique identifier of the relying party application generating the Event.
sessionIdUnique identifier of the web session.
versionThe Event schema version.
subNameAn Event might be broken into sub-steps. The SubEvent distinguishes the various steps. Typically it is the URI of the request.
tenantIdIdentifier for the HYPR Control Center server.

Sourced from the HYPR-TenantID HTTP header or from the hypr.rp.cacheNamespace Vault prop.
tokenTypeThe type of token being passed.

- BEARER: API Authorization token used by Postman.
- OAUTH_CLIENT_CREDENTIALS: OAuth credentials created in Control Center.
- OAUTH_CLIENT_CREDENTIALS_ACCESS_TOKEN: An OAuth access token, used the same way as a Bearer token to access the HYPR Passwordless API.
traceIdAn identifier to assist Support in tracking the Event. If the header is missing, the server starts a new trace.

Sourced from the X-B3-TraceId HTTP header.
typeEvent classification. For API log requests, this will always be AUDIT.
usageTypeCurrently not used.
userAgentIdentifies the application, operating system, vendor, and/or version of the Event's requesting user agent.

Sourced from the User-Agent HTTP header.

Specific Parameters

The following parameters will appear only when a specific Event type is triggered.

Device (Includes Security Keys)

ParameterDescription
deviceIdA HYPR-generated device identifier. deviceId stays same for the lifetime of the App. Reinstalling the App generates a new deviceId.

In this case, Device may refer to a mobile device (90%) or another hardware device (YubiKey, etc.) which stores the private key/authenticator and performs authentication.
deviceModelDevice model number.

Sourced from the HYPR-Device-Model HTTP header.
deviceOSDevice operating system (Android/iOS/security key).

Sourced from the HYPR-Device-OS HTTP header.
deviceOSVersionDevice operating system version. For security keys, this will be the firmware version.

Sourced from the HYPR-Device-OS-Version HTTP header.
deviceRelVersionVersion of the HYPR Mobile App.

Sourced from the HYPR-Device-Release-Version HTTP header.
deviceTypeRepresents any special indication of the device type triggering the Event.
[ MOBILE | SECURITY_KEY | WEBAUTHN ]
sdkRelVersionVersion of the HYPR SDK.

Sourced from the HYPR-SDK-Release-Version HTTP header.
tokensAvailableNumber of Offline Mode tokens available.
tokensRemainingNumber of Offline Mode tokens remaining.

Workstation

ParameterDescription
extendedMessageAn additional message from the workstation regarding the Event.
machineIdA HYPR-generated machine identifier.

In this case, Machine refers to the entity requesting authentication.

Possible Values:

Website
Accessing the same website in different browsers is considered to be the same machine. machineId is derived as
sha256(window.location.hostname + user + rpAppID)

WorkStation
The UUID generated upon Workstation install. This is not related to the underlying OS. The machineId remains constant through the life of the install or upgrade. A re-install of the Workstation will generate a new machineId."
machineTypeDefines when a machine is persisted/non-persisted with a local, web, or domain account.

Possible values:
- WEB: Persisted workstation with local account website
- WORKSTATION: Persisted workstation with local account
- WORKSTATION_DOMAIN: Persisted workstation with domain account
- VDI: Non-persisted workstation with non-domain account
offlineAccessDaysNumber of days remaining on offline tokens.
offlineAccessEnabledToggle Offline Access.

Possible Values: True, False
offlineTokenCountTotal number of offline tokens.
offlineTokenLengthLength of the offline token.
tokensAvailableNumber of tokens available.
tokensRemainingNumber of tokens remaining.
wsModelWorkstation model number.

Sourced from the HYPR-WS-Model HTTP header.
wsOSWorkstation operating system.

Sourced from the HYPR-WS-OS HTTP header.
wsOSVersionWorkstation operating system version.

Sourced from the HYPR-Device-OS-Version HTTP header.
wsRelVersionVersion of the HYPR Passwordless client.

Sourced from the HYPR-WS-Release-Version HTTP header.

Server

ParameterDescription
nodeIP address of the node.
serverRelVersionVersion of the HYPR Control Center.

Web

ParameterDescription
extendedMessageAdditional details.
machineNameUnique name of the machine.

Identity Verification - HYPR Affirm

ParameterSub-parameterDescription
affirmResultBoolean value indicating approval or denial. [ true | false ]
affirmResultTypeChoose the behavior after identity verification is complete:
- MAGIC_LINK: The user will be routed to the Control Center Device Manager via a Magic Link
- TAP: Entra ID users will be given a temporary access pass
- None: Used when affirmation fails or the approver denies verification.
affirmVerificationFlowAn object containing the configuration data for the Verification Flow as the tab of the same name in Control Center.
affirmVerificationFlow.approverAttestationRequiredBoolean value indicating whether or not the approver attestation is required. Enabled by default. [ true | false ]
affirmVerificationFlow.chatApproverRequiredBoolean value indicating whether or not the chat is required. [ true | false ]
affirmVerificationFlow.chatCheckBoolean value indicating whether or not basic chat is enabled. [ true | false ]
affirmVerificationFlow.chatDocumentRequiredBoolean value indicating whether or not document upload is required in chat. [ true | false ]
affirmVerificationFlow.chatSelfieEnabledBoolean value indicating whether or not the chat selfie feature is enabled. [ true | false ]
affirmVerificationFlow.chatSelfieRequiredBoolean value indicating whether or not the selfie requirement is enabled. [ true | false ]
affirmVerificationFlow.idvCheckBoolean value indicating whether or not the identity verification checks category is enabled. [ true | false ]
affirmVerificationFlow.idvNameCheckBoolean value indicating whether or not the name checks are enabled. [ true | false ]
affirmVerificationFlow.locationCheckBoolean value indicating whether or not the location checks are enabled. [ true | false ]
affirmVerificationFlow.phoneNumberCheckBoolean value indicating whether or not the Phone Number checks are enabled. Enabled by default. [ true | false ]
affirmVerificationFlow.smsCheckBoolean value indicating whether or not the SMS checks are enabled. If phoneNumberCheck is true, this will also be true. [ true | false ]
affirmVerificationFlow.videoChatCheckBoolean value indicating whether or not video chat image capture comparison is enabled. [ true | false ]
approverThe name of the approver.
approverEmailThe approver's email address.
attestationCommentA free text field to hold approver comments.
attestationResultBoolean value indicating the success of attestation. [ true | false ]
attestationTimestampThe Epoch timestamp of the attestation.
conversationIdUnique identifier for the conversation.
costsTrackingThe data object used to track costs.
costsTracking.exceptionMessageDisplays additional error codes if applicable.
costsTracking.incursCostBoolean value to confirm cost-incurring requests. [ true | false ]
costsTracking.isSuccessfulBoolean value indicating success or failure. [ true | false ]
costsTracking.messagesA list of messages in the verification flow.
costsTracking.operationVaries depending on costsTrackingPlatform:

GOOGLE_LOCATION:

- GOOGLE_LOCATION_DISTANCE
- GOOGLE_LOCATION_ADDRESS

AWS_PINPOINT:

- AWS_PINTPOINT_INVITE_SEND_EMAIL
- AWS_PINTPOINT_INVITE_SEND_TEXT
- AWS_PINPOINT_SMS_SEND

AWS_REKOGNITION:

- AWS_REKOGNITION_FACE_MATCH_IN_PROGRESS
- AWS_REKOGNITION_FACE_MATCH_RESULT

TWILIO:

- TWILIO_VIDEO_ACCESS_TOKEN_CREATED
- TWILIO_PHONE_NUMBER_V1
- TWILIO_LOOKUP_CARRIER_DATA
- TWILIO_NEW_CONVERSATION
- TWILIO_EXISTING_CONVERSATION
costsTracking.participantsA list of participants in the verification flow.
costsTracking.platformThe platform used for cost tracking.
[ GOOGLE_LOCATION, AWS_PINPOINT, AWS_REKOGNITION, TWILIO, NONE ]
faceMatchResultIndicates the state of the facial recognition matching. If this feature is not enabled, this value will be null. [ null | MATCH | IN PROGRESS ]
flowIs this for Onboarding or Recovery? [ ONBOARDING | RECOVERY ]
inviteEmailEmail address used if inviteSendVia is set to EMAIL.
inviteSendViaMethod by which the invitation is sent. [ EMAIL | SMS ]
locationIpDistanceLocation data derived from the requester's browser and IP address data. Expressed as '[distance] from home address'.
locationReverseGeocodeDistanceDistance expressed as a number of units.
phoneNumberVerifiedBoolean value indicating whether or not the phone number has been verified. [ true | false ]
stateThe state of the Application Association.
[ ENABLE | DISABLE | REMOVE ]
textCodeSentBoolean value indicating whether or not an SMS code has been sent. [ true | false ]
textCodeVerifiedBoolean value indicating whether or not an SMS code has been verified. [ true | false ]
userRoleWhat role is this user? Requester | Approver
videoBoolean value that determines whether or not a video chat will connect the requester and approver. [ true | false ]
videoChatRoomNameThe label for the video chat room.
workflowIdUnique identifier for the Affirm workflow.

Event Log File (On-premises Only)

HYPR generates Event log files for tracing errors and Events, and to help integration with SIEM tools such as Splunk, Greylog, etc.

Control Center Event Log File

The CC Event log is located under the /opt/hypr/<server install dir> logs directory. It contains all Control Center Events.

UAF Event Log File

The UAF Event log is located in the /opt/hypr/<server install dir> logs directory. This contains all UAF Events.