TOTPRadius - Remote syslog configuration options
System Logging Protocol (Syslog) is a way network devices can use a standard message format to communicate with a logging server.It was designed specifically to make it easy for administrators to monitor network devices, also review and manage those logs.
Starting from TOTPRadius v0.2.9, it is possible to send logs to a Remote syslog server. This can be configured in Settings → Remote syslog server

The syslog message contains information about user enrollment , authentication attempt, and admin’s activity . The server should be specified in IP_OR_FQDN:PORT format. Messages will be sent via UDP only. Set this value to "none" to disable the feature.
Message examples:
July 14, 2022, 02:33:56 token2 TOTPRadius; Radius authentication request from testuser01 ; Client IP: 192.168.0.104 July 14, 2022, 02:33:56 token2 TOTPRadius; Authentication attempt for testuser01 ; Return value: Reject July 14, 2022, 02:49:43 token2 TOTPRadius; Authentication attempt for testuser02 ; Return value: Accept July 14, 2022, 02:53:17 token2 TOTPRadius; Admin action: IP:192.168.0.104; admin/; table :users; action: insert July 14, 2022, 02:53:17 token2 TOTPRadius; Admin has added a user from the admin panel. Username: testuser03
Local syslog log file
Even if a remote syslog server is not specified, a copy of syslog messages is kept on the appliance locally. This log can be accessed from Settings → User actions log
About
Installation and configuration
- Installation and initial configuration
- Network configuration
- Migrating from older versions
- LDAP Configuration
- Azure AD Configuration
- Self-service enrollment portal
- Web and LDAPS Certificates
- Syslog configuration
- Single-factor authentication exceptions
- Slave appliance mode
- Dynamic RADIUS Attributes
Integration guides
Blog
15-05-2023
Azure AD Authentication methods policy migration
In an effort to enhance security and streamline administration, Microsoft introduced the Authentication methods policy for Azure AD. This policy allows administrators to manage the MFA and SSPR settings from a single location, simplifying the overall user experience. However, it's important to note that the migration process has a limitation when it comes to hardware OATH tokens.
05-05-2023
Molto2 Receives "Certified Product" Badge from Independent Third-Party Assessment by SySS GmbH
At our company, we believe in delivering safe and secure products to our customers. That's why we engaged SySS GmbH, an independent third-party security company, to conduct a thorough security assessment of our product, Molto2. We are proud to announce that Molto2 has passed this assessment with flying colors and has received a "Certified Product" badge from SySS GmbH.
21-04-2023
Introducing Token2 FIDO2 PIN+: The Security Key That Enforces Strong PIN Complexity
We are excited to announce the upcoming launch of our latest product variation, the Token2 FIDO2 PIN+. The PIN+ series is a new variation of our existing security keys that deviates from the FIDO2 standards to provide stronger PIN complexity enforcement.