Portal field news

Portal field news


📊 | Soracom Launches Login Audit Log Function and Security Check Sheet


Soracom launches login audit log function and security check sheet

If you write the contents roughly
By combining this function with the SAM function, it is possible to record and inquire the history of authentication for each management user via login or API.

Nowadays, companies are using IoT, AI, cloud, and other techno to transform their businesses and create new business value. → Continue reading


IoTNEWS is a media that supports people who do business using IoT/AI and companies that want to achieve digital transformation (DX).
We collect and distribute various information in Japan and overseas, as well as coverage articles, opinion articles, articles useful for studying, data and diagrams that can be used for business planning documents.

Wikipedia related words

If there is no explanation, there is no corresponding item on Wikipedia.

SAM function


Login(British: log in) IsComputerIdentify the user's identity and validity at the start of use, and variousresourceThis is an operation to obtain the credentials required to access.Typically,Computer securityIt is incorporated as part of the methods and means related to.Logon(British: log on),Sign in(British: sign in),Sign on(British: sign on)[Source required]Also called.


The original meaning of log is "log".This was used on a shipLogbook Derived from (logbook).The logbook records the speed of the ship, but the word "log" is used because the speed was once measured by "the time it takes for a log dropped from the bow to reach the stern" (Data log # etymologyandKnot #OriginSee).

In English, it is said that the usage record kept while using the computer is called "log" according to the ship terminology, and that the worker goes to the factory and stamps the time on the time card. clock in Therefore, the start of use of the computer system is called login, and the end of use is called logout.[Source required].

To log in to a general system, enter the following character string into the system.

  • User name --A short string used to uniquely identify a person.Using this character string as a clue, information such as the real name is further referred to.
  • Password --A string provided with your username.It is the "key" for logging in to the system and must be kept secret from other users as it can be misused by a third party.パスワードはThe password isAuthenticationIt is a means for, and can be replaced by other authentication methods.

Often this username and password isComputer system,Computer network, ま た はdomainIt is also used to access.ログイン処理に伴って、ユーザー固有のUser-specific with login processsessionIs created on the computer.The system software limits what the user can do with this session while the user is logged in.English-speaking countriesNow, point to the group of users currently in use logins The operation to start using the system is called log in I call it and use it properly.

When a user ends a sessionLog out (British: log out).


Words synonymous with "login" include "logon," "sign in," and "sign on."Each of these has a pair of words "logout", "logoff", "signout", and "signoff", but their meanings are completely synonymous, and their usage depends on the culture of the system.

UNIX,LinuxFor the general "login" and "logout" used inMicrosoft tends to establish its own terms in its product development strategy[Original research?]Do not use the word "login" as much as possibleWindows 7Had a tendency to use "logon" until[Source required]..Therefore, entering a Windows session was called "logon", and leaving the session was called "logoff".[Source required]. But,Windows 8After that, it was renamed to "Sign in" and "Sign out"[why?].

The term sign-on was originallyIBMUsed in[Source required].

In addition, "Single sign-onIs not called "single login," "single logon," or "single sign-in."

Easy login

Japan OfMobile phone(SmartphoneThere is a login system called "Easy Login" that can be used on the website for (excluding).Of the terminalContractor unique IDCan be recorded on the server side as authentication information, and you can log in with the touch of a button without entering an ID and password.But,HTTPIt has been pointed out that there is a risk of spoofing by disguising the header information because it is exchanged using the information in the request header.[1].


[How to use footnotes]


  1. ^ Yasuhiro Koyama: “What is the security problem of "Easy Login"?-WASForum 2010 (1) Problems pointed out in "Easy Login"". My Navi News (September 2010, 6). 2010/8/19Browse.


Back to Top