This document lists the events and parameters for
      various types of
      Login Audit activity events. You can retrieve these events by
      calling Activities.list()
      with applicationName=login.
    
    
      2-step verification enrollment changed
        
          Events of this type are returned with type=2sv_change.
        
          
            
            
            2-step verification disable
            
              
                
                  | Event details | 
              
              
                
                  | Event name | 2sv_disable | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=2sv_disable&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has disabled 2-step verification
 | 
              
            
          
          
            
            
            2-step verification enroll
            
              
                
                  | Event details | 
              
              
                
                  | Event name | 2sv_enroll | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=2sv_enroll&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has enrolled for 2-step verification
 | 
              
            
          
      Account password changed
        
          Events of this type are returned with type=password_change.
        
          
            
            
            Account password change
            
              
                
                  | Event details | 
              
              
                
                  | Event name | password_edit | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=password_edit&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has changed Account password
 | 
              
            
          
      Account recovery info changed
        
          Account recovery information changed.
          Events of this type are returned with type=recovery_info_change.
        
          
            
            
            Account recovery email change
            
              
                
                  | Event details | 
              
              
                
                  | Event name | recovery_email_edit | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=recovery_email_edit&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has changed Account recovery email
 | 
              
            
          
          
            
            
            Account recovery phone change
            
              
                
                  | Event details | 
              
              
                
                  | Event name | recovery_phone_edit | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=recovery_phone_edit&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has changed Account recovery phone
 | 
              
            
          
          
            
            
            Account recovery secret question/answer change
            
              
                
                  | Event details | 
              
              
                
                  | Event name | recovery_secret_qa_edit | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=recovery_secret_qa_edit&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has changed Account recovery secret question/answer
 | 
              
            
          
      Account warning
        
          Account warning event type.
          Events of this type are returned with type=account_warning.
        
          
            
            
            Leaked password
              Account warning event account disabled password leak description.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | account_disabled_password_leak | 
                  
                    | Parameters | 
                        
                            
                              | affected_email_address | string
 
                                    Email-id of the user affected by the event.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=account_disabled_password_leak&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | Account {affected_email_address} disabled because Google has become aware that someone else knows its password
 | 
              
            
          
          
            
            
            Passkey enrolled
              Passkey enrolled by user.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | passkey_enrolled | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=passkey_enrolled&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} enrolled a new passkey
 | 
              
            
          
          
            
            
            Passkey removed
              Passkey removed by user.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | passkey_removed | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=passkey_removed&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} removed passkey
 | 
              
            
          
          
            
            
            Suspicious login blocked
              Account warning event suspicious login description.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | suspicious_login | 
                  
                    | Parameters | 
                        
                            
                              | affected_email_address | string
 
                                    Email-id of the user affected by the event.
                                 |  
                              | login_timestamp | integer
 
                                    Login time of account warning event in micros.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=suspicious_login&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | Google has detected a suspicious login for {affected_email_address}
 | 
              
            
          
          
            
            
            Suspicious login from less secure app blocked
              Account warning event suspicious login less secure app description.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | suspicious_login_less_secure_app | 
                  
                    | Parameters | 
                        
                            
                              | affected_email_address | string
 
                                    Email-id of the user affected by the event.
                                 |  
                              | login_timestamp | integer
 
                                    Login time of account warning event in micros.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=suspicious_login_less_secure_app&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | Google has detected a suspicious login for {affected_email_address} from a less secure app
 | 
              
            
          
          
            
            
            Suspicious programmatic login blocked
              Account warning event suspicious programmatic login description.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | suspicious_programmatic_login | 
                  
                    | Parameters | 
                        
                            
                              | affected_email_address | string
 
                                    Email-id of the user affected by the event.
                                 |  
                              | login_timestamp | integer
 
                                    Login time of account warning event in micros.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=suspicious_programmatic_login&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | Google has detected a suspicious programmatic login for {affected_email_address}
 | 
              
            
          
          
            
            
            User signed out due to suspicious session cookie
              User signed out due to suspicious session cookie(Cookie Cutter Malware Event).
            
              
                
                  | Event details | 
              
              
                
                  | Event name | user_signed_out_due_to_suspicious_session_cookie | 
                  
                    | Parameters | 
                        
                            
                              | affected_email_address | string
 
                                    Email-id of the user affected by the event.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=user_signed_out_due_to_suspicious_session_cookie&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | Suspicious session cookie detected for user {affected_email_address}
 | 
              
            
          
          
            
            
            User suspended
              Account warning event account disabled generic description.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | account_disabled_generic | 
                  
                    | Parameters | 
                        
                            
                              | affected_email_address | string
 
                                    Email-id of the user affected by the event.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=account_disabled_generic&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | Account {affected_email_address} disabled
 | 
              
            
          
          
            
            
            User suspended (spam through relay)
              Account warning event account disabled spamming through relay description.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | account_disabled_spamming_through_relay | 
                  
                    | Parameters | 
                        
                            
                              | affected_email_address | string
 
                                    Email-id of the user affected by the event.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=account_disabled_spamming_through_relay&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | Account {affected_email_address} disabled because Google has become aware that it was used to engage in spamming through SMTP relay service
 | 
              
            
          
          
            
            
            User suspended (spam)
              Account warning event account disabled spamming description.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | account_disabled_spamming | 
                  
                    | Parameters | 
                        
                            
                              | affected_email_address | string
 
                                    Email-id of the user affected by the event.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=account_disabled_spamming&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | Account {affected_email_address} disabled because Google has become aware that it was used to engage in spamming
 | 
              
            
          
          
            
            
            User suspended (suspicious activity)
              Account warning event account disabled hijacked description.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | account_disabled_hijacked | 
                  
                    | Parameters | 
                        
                            
                              | affected_email_address | string
 
                                    Email-id of the user affected by the event.
                                 |  
                              | login_timestamp | integer
 
                                    Login time of account warning event in micros.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=account_disabled_hijacked&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | Account {affected_email_address} disabled because Google has detected a suspicious activity indicating it might have been compromised
 | 
              
            
          
      Advanced Protection enrollment changed
        
          Events of this type are returned with type=titanium_change.
        
          
            
            
            Advanced Protection enroll
            
              
                
                  | Event details | 
              
              
                
                  | Event name | titanium_enroll | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=titanium_enroll&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has enrolled for Advanced Protection
 | 
              
            
          
          
            
            
            Advanced Protection unenroll
            
              
                
                  | Event details | 
              
              
                
                  | Event name | titanium_unenroll | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=titanium_unenroll&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has disabled Advanced Protection
 | 
              
            
          
      Attack Warning
        
          Attack Warning Event Type.
          Events of this type are returned with type=attack_warning.
        
          
            
            
            Government-backed Attack
              Government-backed attack warning event name.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | gov_attack_warning | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=gov_attack_warning&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} might have been targeted by government-backed attack
 | 
              
            
          
      Blocked sender settings changed
        
          Events of this type are returned with type=blocked_sender_change.
        
          
            
            
            Blocked all future emails from the sender.
              Blocked email address.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | blocked_sender | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=blocked_sender&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has blocked all future messages from {affected_email_address}.
 | 
              
            
          
      Email forwarding settings changed
        
          Events of this type are returned with type=email_forwarding_change.
        
          
            
            
            Out of domain email forwarding enabled
            
              
                
                  | Event details | 
              
              
                
                  | Event name | email_forwarding_out_of_domain | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=email_forwarding_out_of_domain&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} has enabled out of domain email forwarding to {email_forwarding_destination_address}.
 | 
              
            
          
      Login
        
          Login Event Type.
          Events of this type are returned with type=login.
        
          
            
            
            Failed Login
              A login attempt was unsuccessful.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | login_failure | 
                  
                    | Parameters | 
                        
                            
                              | login_challenge_method | string
 
                                    Login challenge method.
                                  Possible values:
                                 
                                      access_to_preregistered_emailA challenge requiring access to a verification email in the inbox.
assistant_approvalA challenge that lets the user approve authentication by a Google Assistant product.
backup_codeAsks user to enter a backup verification code.
captchaA challenge to distinguish humans from automated bots using captcha.
cnameA challenge that requires the user to prove ownership of a domain by changing the CNAME record at their hosting provider.
cross_accountA challenge that lets products start an authentication session on one device under the primary account, delegate it for completion under another account, and then receive credentials for the session on the original initiating device owned by the primary account.
cross_deviceA challenge that requires the user to complete authentication on a secondary device.
denyUser sign-in is denied.
device_assertionA challenge based on recognizing a previously used device.
device_preregistered_phoneA challenge that requires the user to verify their phone number on the device. It's currently only used in username recovery and isn’t intended for use in other authentication flows.
device_promptA challenge on the user’s mobile device.
extended_botguardA challenge that uses a series of additional verification steps to ensure human interaction.
google_authenticatorAsks user to enter OTP from authenticator app.
google_promptLogin challenge method Google Prompt.
idv_any_emailA challenge that requires the user to provide a code that Google sent to any email address they provided during the challenge.
idv_any_phoneUser asked for phone number and then enters code sent to that phone.
idv_preregistered_emailA challenge in which a code is sent to another email address the user provided before.
idv_preregistered_phoneUser enters code sent to their preregistered phone.
internal_two_factorLogin challenge method Internal Two Factor.
knowledge_account_creation_dateA challenge that requires the user to provide the approximate date their account was created.
knowledge_cloud_pinA challenge based on the user's cloud service PIN.
knowledge_date_of_birthA challenge that requires the user to provide the date of birth registered on their Google Account.
knowledge_domain_titleA challenge that asks the user to provide their domain title (organization name).
knowledge_employee_idLogin challenge method Knowledge Employee Id.
knowledge_historical_passwordA challenge that lets the user enter either current or previous passwords. When this challenge is used, KNOWLEDGE_PASSWORD will refer only to the current password.
knowledge_last_login_dateA challenge that asks the user the approximate date of their last sign-in.
knowledge_lockscreenA challenge which allows users to enter the lock screen knowledge factor on an eligible device.
knowledge_preregistered_emailUser proves knowledge of preregistered email.
knowledge_preregistered_phoneUser proves knowledge of preregistered phone.
knowledge_real_nameA challenge that requires the user to provide the name(first name, last name) as registered on their Google account.
knowledge_secret_questionA challenge that requires the user to provide the answer to a question they chose.
knowledge_user_countA challenge that asks the user to provide number of users in the domain.
knowledge_youtubeA challenge based on the user's knowledge of their YouTube account details.
login_locationUser enters from where they usually sign in.
manual_recoveryThe user can recover their account only with their admin’s help.
mathA challenge requiring the solution of a mathematical equation.
noneNo login challenge was faced.
offline_otpUser enters OTP code they get from settings on their phone (android only).
oidcA challenge that uses the OIDC protocol.
otherLogin challenge method other.
outdated_app_warningA warning page, designed as a challenge, that notifies the user that they may be using an outdated version of an application. The user has the option to proceed.
parent_authA challenge requiring authorization from a parent or guardian.
passkeyA challenge that uses FIDO2 compliant passkeys or security keys to verify the user’s identity.
passwordPassword.
recaptchaA challenge that protects the user against spam and other types of automated abuse with reCAPTCHA v2 API.
rescue_codeA challenge that allows the user to enter their rescue code, which is a 32 character alphanumeric string that the user is expected to keep safe, and use it to recover their account.
same_device_screenlockA challenge that requires the user to unlock the device on which they are trying to sign in or perform a sensitive action.
samlThe user provides a SAML assertion from a SAML identity provider.
security_keyUser passes the security key cryptographic challenge.
security_key_otpLogin challenge method Security Key OTP.
time_delayAn asynchronous challenge that sends a link by email once a defined hold period has elapsed.
userless_fidoA FIDO challenge that’s not tied to a specific user.
web_approvalA challenge that lets the user scan a QR code using their Apple iOS device’s native camera, and use web approval for sign-in.
 |  
                              | login_failure_type | string
 
                                    (Deprecated) The reason for the login failure.
                                  Possible values:
                                 
                                      login_failure_access_code_disallowedThe user does not have permission to login to the service.
login_failure_account_disabledThe user's account is disabled.
login_failure_invalid_passwordThe user's password was invalid.
login_failure_unknownThe reason for the login failure is not known.
 |  
                              | login_type | string
 
                                    The type of credentials used to attempt login.
                                  Possible values:
                                 
                                      exchangeThe user provides an existing credential and exchanges it for another type—for example, exchanging an OAuth token for a SID. May  indicate that the user was already logged into a session and the two sessions were merged.
google_passwordThe user provides a Google account password.
reauthThe user is already authenticated but must reauthorize.
samlThe user provides a SAML assertion from a SAML identity provider.
unknownLogin type Unknown.
 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=login_failure&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} failed to login
 | 
              
            
          
          
            
            
            Login Challenge
              A login was challenged to verify the user's identity. Any login challenges encountered during a login session are grouped into a single events entry. For example, if a user enters an incorrect password twice, then enters the correct password, which is then followed by a two-step verification using a security key, the events field of the activities.list response looks like the following:
"events": [
  {
    "type": "login",
    "name": "login_success",
    "parameters": [
      {
        "name": "login_type",
        "value": "google_password"
      },
      {
        "name": "login_challenge_method",
        "multiValue": [
          "password",
          "password",
          "password",
          "security_key"
        ]
      },
      {
        "name": "is_suspicious",
        "boolValue": false
      }
    ]
  }
]
For more information about login challenges, see Verify a user’s identity with extra security.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | login_challenge | 
                  
                    | Parameters | 
                        
                            
                              | login_challenge_method | string
 
                                    Login challenge method.
                                  Possible values:
                                 
                                      access_to_preregistered_emailA challenge requiring access to a verification email in the inbox.
assistant_approvalA challenge that lets the user approve authentication by a Google Assistant product.
backup_codeAsks user to enter a backup verification code.
captchaA challenge to distinguish humans from automated bots using captcha.
cnameA challenge that requires the user to prove ownership of a domain by changing the CNAME record at their hosting provider.
cross_accountA challenge that lets products start an authentication session on one device under the primary account, delegate it for completion under another account, and then receive credentials for the session on the original initiating device owned by the primary account.
cross_deviceA challenge that requires the user to complete authentication on a secondary device.
denyUser sign-in is denied.
device_assertionA challenge based on recognizing a previously used device.
device_preregistered_phoneA challenge that requires the user to verify their phone number on the device. It's currently only used in username recovery and isn’t intended for use in other authentication flows.
device_promptA challenge on the user’s mobile device.
extended_botguardA challenge that uses a series of additional verification steps to ensure human interaction.
google_authenticatorAsks user to enter OTP from authenticator app.
google_promptLogin challenge method Google Prompt.
idv_any_emailA challenge that requires the user to provide a code that Google sent to any email address they provided during the challenge.
idv_any_phoneUser asked for phone number and then enters code sent to that phone.
idv_preregistered_emailA challenge in which a code is sent to another email address the user provided before.
idv_preregistered_phoneUser enters code sent to their preregistered phone.
internal_two_factorLogin challenge method Internal Two Factor.
knowledge_account_creation_dateA challenge that requires the user to provide the approximate date their account was created.
knowledge_cloud_pinA challenge based on the user's cloud service PIN.
knowledge_date_of_birthA challenge that requires the user to provide the date of birth registered on their Google Account.
knowledge_domain_titleA challenge that asks the user to provide their domain title (organization name).
knowledge_employee_idLogin challenge method Knowledge Employee Id.
knowledge_historical_passwordA challenge that lets the user enter either current or previous passwords. When this challenge is used, KNOWLEDGE_PASSWORD will refer only to the current password.
knowledge_last_login_dateA challenge that asks the user the approximate date of their last sign-in.
knowledge_lockscreenA challenge which allows users to enter the lock screen knowledge factor on an eligible device.
knowledge_preregistered_emailUser proves knowledge of preregistered email.
knowledge_preregistered_phoneUser proves knowledge of preregistered phone.
knowledge_real_nameA challenge that requires the user to provide the name(first name, last name) as registered on their Google account.
knowledge_secret_questionA challenge that requires the user to provide the answer to a question they chose.
knowledge_user_countA challenge that asks the user to provide number of users in the domain.
knowledge_youtubeA challenge based on the user's knowledge of their YouTube account details.
login_locationUser enters from where they usually sign in.
manual_recoveryThe user can recover their account only with their admin’s help.
mathA challenge requiring the solution of a mathematical equation.
noneNo login challenge was faced.
offline_otpUser enters OTP code they get from settings on their phone (android only).
oidcA challenge that uses the OIDC protocol.
otherLogin challenge method other.
outdated_app_warningA warning page, designed as a challenge, that notifies the user that they may be using an outdated version of an application. The user has the option to proceed.
parent_authA challenge requiring authorization from a parent or guardian.
passkeyA challenge that uses FIDO2 compliant passkeys or security keys to verify the user’s identity.
passwordPassword.
recaptchaA challenge that protects the user against spam and other types of automated abuse with reCAPTCHA v2 API.
rescue_codeA challenge that allows the user to enter their rescue code, which is a 32 character alphanumeric string that the user is expected to keep safe, and use it to recover their account.
same_device_screenlockA challenge that requires the user to unlock the device on which they are trying to sign in or perform a sensitive action.
samlThe user provides a SAML assertion from a SAML identity provider.
security_keyUser passes the security key cryptographic challenge.
security_key_otpLogin challenge method Security Key OTP.
time_delayAn asynchronous challenge that sends a link by email once a defined hold period has elapsed.
userless_fidoA FIDO challenge that’s not tied to a specific user.
web_approvalA challenge that lets the user scan a QR code using their Apple iOS device’s native camera, and use web approval for sign-in.
 |  
                              | login_challenge_status | string
 
                                    Whether the login challenge succeeded or failed, represented as "Challenge Passed." and "Challenge Failed." respectively. An empty string indicates an unknown status.
                                 |  
                              | login_type | string
 
                                    The type of credentials used to attempt login.
                                  Possible values:
                                 
                                      exchangeThe user provides an existing credential and exchanges it for another type—for example, exchanging an OAuth token for a SID. May  indicate that the user was already logged into a session and the two sessions were merged.
google_passwordThe user provides a Google account password.
reauthThe user is already authenticated but must reauthorize.
samlThe user provides a SAML assertion from a SAML identity provider.
unknownLogin type Unknown.
 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=login_challenge&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} was presented with a login challenge
 | 
              
            
          
          
            
            
            Login Verification
              Login verification event name.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | login_verification | 
                  
                    | Parameters | 
                        
                            
                              | is_second_factor | boolean
 
                                    Whether the login verification is 2SV.
                                  Possible values:
                                 
                                      falseBoolean value false.
trueBoolean value true.
 |  
                              | login_challenge_method | string
 
                                    Login challenge method.
                                  Possible values:
                                 
                                      access_to_preregistered_emailA challenge requiring access to a verification email in the inbox.
assistant_approvalA challenge that lets the user approve authentication by a Google Assistant product.
backup_codeAsks user to enter a backup verification code.
captchaA challenge to distinguish humans from automated bots using captcha.
cnameA challenge that requires the user to prove ownership of a domain by changing the CNAME record at their hosting provider.
cross_accountA challenge that lets products start an authentication session on one device under the primary account, delegate it for completion under another account, and then receive credentials for the session on the original initiating device owned by the primary account.
cross_deviceA challenge that requires the user to complete authentication on a secondary device.
denyUser sign-in is denied.
device_assertionA challenge based on recognizing a previously used device.
device_preregistered_phoneA challenge that requires the user to verify their phone number on the device. It's currently only used in username recovery and isn’t intended for use in other authentication flows.
device_promptA challenge on the user’s mobile device.
extended_botguardA challenge that uses a series of additional verification steps to ensure human interaction.
google_authenticatorAsks user to enter OTP from authenticator app.
google_promptLogin challenge method Google Prompt.
idv_any_emailA challenge that requires the user to provide a code that Google sent to any email address they provided during the challenge.
idv_any_phoneUser asked for phone number and then enters code sent to that phone.
idv_preregistered_emailA challenge in which a code is sent to another email address the user provided before.
idv_preregistered_phoneUser enters code sent to their preregistered phone.
internal_two_factorLogin challenge method Internal Two Factor.
knowledge_account_creation_dateA challenge that requires the user to provide the approximate date their account was created.
knowledge_cloud_pinA challenge based on the user's cloud service PIN.
knowledge_date_of_birthA challenge that requires the user to provide the date of birth registered on their Google Account.
knowledge_domain_titleA challenge that asks the user to provide their domain title (organization name).
knowledge_employee_idLogin challenge method Knowledge Employee Id.
knowledge_historical_passwordA challenge that lets the user enter either current or previous passwords. When this challenge is used, KNOWLEDGE_PASSWORD will refer only to the current password.
knowledge_last_login_dateA challenge that asks the user the approximate date of their last sign-in.
knowledge_lockscreenA challenge which allows users to enter the lock screen knowledge factor on an eligible device.
knowledge_preregistered_emailUser proves knowledge of preregistered email.
knowledge_preregistered_phoneUser proves knowledge of preregistered phone.
knowledge_real_nameA challenge that requires the user to provide the name(first name, last name) as registered on their Google account.
knowledge_secret_questionA challenge that requires the user to provide the answer to a question they chose.
knowledge_user_countA challenge that asks the user to provide number of users in the domain.
knowledge_youtubeA challenge based on the user's knowledge of their YouTube account details.
login_locationUser enters from where they usually sign in.
manual_recoveryThe user can recover their account only with their admin’s help.
mathA challenge requiring the solution of a mathematical equation.
noneNo login challenge was faced.
offline_otpUser enters OTP code they get from settings on their phone (android only).
oidcA challenge that uses the OIDC protocol.
otherLogin challenge method other.
outdated_app_warningA warning page, designed as a challenge, that notifies the user that they may be using an outdated version of an application. The user has the option to proceed.
parent_authA challenge requiring authorization from a parent or guardian.
passkeyA challenge that uses FIDO2 compliant passkeys or security keys to verify the user’s identity.
passwordPassword.
recaptchaA challenge that protects the user against spam and other types of automated abuse with reCAPTCHA v2 API.
rescue_codeA challenge that allows the user to enter their rescue code, which is a 32 character alphanumeric string that the user is expected to keep safe, and use it to recover their account.
same_device_screenlockA challenge that requires the user to unlock the device on which they are trying to sign in or perform a sensitive action.
samlThe user provides a SAML assertion from a SAML identity provider.
security_keyUser passes the security key cryptographic challenge.
security_key_otpLogin challenge method Security Key OTP.
time_delayAn asynchronous challenge that sends a link by email once a defined hold period has elapsed.
userless_fidoA FIDO challenge that’s not tied to a specific user.
web_approvalA challenge that lets the user scan a QR code using their Apple iOS device’s native camera, and use web approval for sign-in.
 |  
                              | login_challenge_status | string
 
                                    Whether the login challenge succeeded or failed, represented as "Challenge Passed." and "Challenge Failed." respectively. An empty string indicates an unknown status.
                                 |  
                              | login_type | string
 
                                    The type of credentials used to attempt login.
                                  Possible values:
                                 
                                      exchangeThe user provides an existing credential and exchanges it for another type—for example, exchanging an OAuth token for a SID. May  indicate that the user was already logged into a session and the two sessions were merged.
google_passwordThe user provides a Google account password.
reauthThe user is already authenticated but must reauthorize.
samlThe user provides a SAML assertion from a SAML identity provider.
unknownLogin type Unknown.
 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=login_verification&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} was presented with login verification
 | 
              
            
          
          
            
            
            Logout
              The user logged out.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | logout | 
                  
                    | Parameters | 
                        
                            
                              | login_type | string
 
                                    The type of credentials used to attempt login.
                                  Possible values:
                                 
                                      exchangeThe user provides an existing credential and exchanges it for another type—for example, exchanging an OAuth token for a SID. May  indicate that the user was already logged into a session and the two sessions were merged.
google_passwordThe user provides a Google account password.
reauthThe user is already authenticated but must reauthorize.
samlThe user provides a SAML assertion from a SAML identity provider.
unknownLogin type Unknown.
 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=logout&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} logged out
 | 
              
            
          
          
            
            
            Sensitive action allowed
            
              
                
                  | Event details | 
              
              
                
                  | Event name | risky_sensitive_action_allowed | 
                  
                    | Parameters | 
                        
                            
                              | is_suspicious | boolean
 
                                    The login attempt had some unusual characteristics, for example the user logged in from an unfamiliar IP address.
                                  Possible values:
                                 
                                      falseBoolean value false.
trueBoolean value true.
 |  
                              | login_challenge_method | string
 
                                    Login challenge method.
                                  Possible values:
                                 
                                      access_to_preregistered_emailA challenge requiring access to a verification email in the inbox.
assistant_approvalA challenge that lets the user approve authentication by a Google Assistant product.
backup_codeAsks user to enter a backup verification code.
captchaA challenge to distinguish humans from automated bots using captcha.
cnameA challenge that requires the user to prove ownership of a domain by changing the CNAME record at their hosting provider.
cross_accountA challenge that lets products start an authentication session on one device under the primary account, delegate it for completion under another account, and then receive credentials for the session on the original initiating device owned by the primary account.
cross_deviceA challenge that requires the user to complete authentication on a secondary device.
denyUser sign-in is denied.
device_assertionA challenge based on recognizing a previously used device.
device_preregistered_phoneA challenge that requires the user to verify their phone number on the device. It's currently only used in username recovery and isn’t intended for use in other authentication flows.
device_promptA challenge on the user’s mobile device.
extended_botguardA challenge that uses a series of additional verification steps to ensure human interaction.
google_authenticatorAsks user to enter OTP from authenticator app.
google_promptLogin challenge method Google Prompt.
idv_any_emailA challenge that requires the user to provide a code that Google sent to any email address they provided during the challenge.
idv_any_phoneUser asked for phone number and then enters code sent to that phone.
idv_preregistered_emailA challenge in which a code is sent to another email address the user provided before.
idv_preregistered_phoneUser enters code sent to their preregistered phone.
internal_two_factorLogin challenge method Internal Two Factor.
knowledge_account_creation_dateA challenge that requires the user to provide the approximate date their account was created.
knowledge_cloud_pinA challenge based on the user's cloud service PIN.
knowledge_date_of_birthA challenge that requires the user to provide the date of birth registered on their Google Account.
knowledge_domain_titleA challenge that asks the user to provide their domain title (organization name).
knowledge_employee_idLogin challenge method Knowledge Employee Id.
knowledge_historical_passwordA challenge that lets the user enter either current or previous passwords. When this challenge is used, KNOWLEDGE_PASSWORD will refer only to the current password.
knowledge_last_login_dateA challenge that asks the user the approximate date of their last sign-in.
knowledge_lockscreenA challenge which allows users to enter the lock screen knowledge factor on an eligible device.
knowledge_preregistered_emailUser proves knowledge of preregistered email.
knowledge_preregistered_phoneUser proves knowledge of preregistered phone.
knowledge_real_nameA challenge that requires the user to provide the name(first name, last name) as registered on their Google account.
knowledge_secret_questionA challenge that requires the user to provide the answer to a question they chose.
knowledge_user_countA challenge that asks the user to provide number of users in the domain.
knowledge_youtubeA challenge based on the user's knowledge of their YouTube account details.
login_locationUser enters from where they usually sign in.
manual_recoveryThe user can recover their account only with their admin’s help.
mathA challenge requiring the solution of a mathematical equation.
noneNo login challenge was faced.
offline_otpUser enters OTP code they get from settings on their phone (android only).
oidcA challenge that uses the OIDC protocol.
otherLogin challenge method other.
outdated_app_warningA warning page, designed as a challenge, that notifies the user that they may be using an outdated version of an application. The user has the option to proceed.
parent_authA challenge requiring authorization from a parent or guardian.
passkeyA challenge that uses FIDO2 compliant passkeys or security keys to verify the user’s identity.
passwordPassword.
recaptchaA challenge that protects the user against spam and other types of automated abuse with reCAPTCHA v2 API.
rescue_codeA challenge that allows the user to enter their rescue code, which is a 32 character alphanumeric string that the user is expected to keep safe, and use it to recover their account.
same_device_screenlockA challenge that requires the user to unlock the device on which they are trying to sign in or perform a sensitive action.
samlThe user provides a SAML assertion from a SAML identity provider.
security_keyUser passes the security key cryptographic challenge.
security_key_otpLogin challenge method Security Key OTP.
time_delayAn asynchronous challenge that sends a link by email once a defined hold period has elapsed.
userless_fidoA FIDO challenge that’s not tied to a specific user.
web_approvalA challenge that lets the user scan a QR code using their Apple iOS device’s native camera, and use web approval for sign-in.
 |  
                              | login_challenge_status | string
 
                                    Whether the login challenge succeeded or failed, represented as "Challenge Passed." and "Challenge Failed." respectively. An empty string indicates an unknown status.
                                 |  
                              | login_type | string
 
                                    The type of credentials used to attempt login.
                                  Possible values:
                                 
                                      exchangeThe user provides an existing credential and exchanges it for another type—for example, exchanging an OAuth token for a SID. May  indicate that the user was already logged into a session and the two sessions were merged.
google_passwordThe user provides a Google account password.
reauthThe user is already authenticated but must reauthorize.
samlThe user provides a SAML assertion from a SAML identity provider.
unknownLogin type Unknown.
 |  
                              | sensitive_action_name | string
 
                                    Description for sensitive action name in risky sensitive action challenged event.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=risky_sensitive_action_allowed&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} was allowed to attempt sensitive action: {sensitive_action_name}. This action might be restricted based on privileges or other limitations.
 | 
              
            
          
          
            
            
            Sensitive action blocked
            
              
                
                  | Event details | 
              
              
                
                  | Event name | risky_sensitive_action_blocked | 
                  
                    | Parameters | 
                        
                            
                              | is_suspicious | boolean
 
                                    The login attempt had some unusual characteristics, for example the user logged in from an unfamiliar IP address.
                                  Possible values:
                                 
                                      falseBoolean value false.
trueBoolean value true.
 |  
                              | login_challenge_method | string
 
                                    Login challenge method.
                                  Possible values:
                                 
                                      access_to_preregistered_emailA challenge requiring access to a verification email in the inbox.
assistant_approvalA challenge that lets the user approve authentication by a Google Assistant product.
backup_codeAsks user to enter a backup verification code.
captchaA challenge to distinguish humans from automated bots using captcha.
cnameA challenge that requires the user to prove ownership of a domain by changing the CNAME record at their hosting provider.
cross_accountA challenge that lets products start an authentication session on one device under the primary account, delegate it for completion under another account, and then receive credentials for the session on the original initiating device owned by the primary account.
cross_deviceA challenge that requires the user to complete authentication on a secondary device.
denyUser sign-in is denied.
device_assertionA challenge based on recognizing a previously used device.
device_preregistered_phoneA challenge that requires the user to verify their phone number on the device. It's currently only used in username recovery and isn’t intended for use in other authentication flows.
device_promptA challenge on the user’s mobile device.
extended_botguardA challenge that uses a series of additional verification steps to ensure human interaction.
google_authenticatorAsks user to enter OTP from authenticator app.
google_promptLogin challenge method Google Prompt.
idv_any_emailA challenge that requires the user to provide a code that Google sent to any email address they provided during the challenge.
idv_any_phoneUser asked for phone number and then enters code sent to that phone.
idv_preregistered_emailA challenge in which a code is sent to another email address the user provided before.
idv_preregistered_phoneUser enters code sent to their preregistered phone.
internal_two_factorLogin challenge method Internal Two Factor.
knowledge_account_creation_dateA challenge that requires the user to provide the approximate date their account was created.
knowledge_cloud_pinA challenge based on the user's cloud service PIN.
knowledge_date_of_birthA challenge that requires the user to provide the date of birth registered on their Google Account.
knowledge_domain_titleA challenge that asks the user to provide their domain title (organization name).
knowledge_employee_idLogin challenge method Knowledge Employee Id.
knowledge_historical_passwordA challenge that lets the user enter either current or previous passwords. When this challenge is used, KNOWLEDGE_PASSWORD will refer only to the current password.
knowledge_last_login_dateA challenge that asks the user the approximate date of their last sign-in.
knowledge_lockscreenA challenge which allows users to enter the lock screen knowledge factor on an eligible device.
knowledge_preregistered_emailUser proves knowledge of preregistered email.
knowledge_preregistered_phoneUser proves knowledge of preregistered phone.
knowledge_real_nameA challenge that requires the user to provide the name(first name, last name) as registered on their Google account.
knowledge_secret_questionA challenge that requires the user to provide the answer to a question they chose.
knowledge_user_countA challenge that asks the user to provide number of users in the domain.
knowledge_youtubeA challenge based on the user's knowledge of their YouTube account details.
login_locationUser enters from where they usually sign in.
manual_recoveryThe user can recover their account only with their admin’s help.
mathA challenge requiring the solution of a mathematical equation.
noneNo login challenge was faced.
offline_otpUser enters OTP code they get from settings on their phone (android only).
oidcA challenge that uses the OIDC protocol.
otherLogin challenge method other.
outdated_app_warningA warning page, designed as a challenge, that notifies the user that they may be using an outdated version of an application. The user has the option to proceed.
parent_authA challenge requiring authorization from a parent or guardian.
passkeyA challenge that uses FIDO2 compliant passkeys or security keys to verify the user’s identity.
passwordPassword.
recaptchaA challenge that protects the user against spam and other types of automated abuse with reCAPTCHA v2 API.
rescue_codeA challenge that allows the user to enter their rescue code, which is a 32 character alphanumeric string that the user is expected to keep safe, and use it to recover their account.
same_device_screenlockA challenge that requires the user to unlock the device on which they are trying to sign in or perform a sensitive action.
samlThe user provides a SAML assertion from a SAML identity provider.
security_keyUser passes the security key cryptographic challenge.
security_key_otpLogin challenge method Security Key OTP.
time_delayAn asynchronous challenge that sends a link by email once a defined hold period has elapsed.
userless_fidoA FIDO challenge that’s not tied to a specific user.
web_approvalA challenge that lets the user scan a QR code using their Apple iOS device’s native camera, and use web approval for sign-in.
 |  
                              | login_challenge_status | string
 
                                    Whether the login challenge succeeded or failed, represented as "Challenge Passed." and "Challenge Failed." respectively. An empty string indicates an unknown status.
                                 |  
                              | login_type | string
 
                                    The type of credentials used to attempt login.
                                  Possible values:
                                 
                                      exchangeThe user provides an existing credential and exchanges it for another type—for example, exchanging an OAuth token for a SID. May  indicate that the user was already logged into a session and the two sessions were merged.
google_passwordThe user provides a Google account password.
reauthThe user is already authenticated but must reauthorize.
samlThe user provides a SAML assertion from a SAML identity provider.
unknownLogin type Unknown.
 |  
                              | sensitive_action_name | string
 
                                    Description for sensitive action name in risky sensitive action challenged event.
                                 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=risky_sensitive_action_blocked&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} wasn't allowed to attempt sensitive action: {sensitive_action_name}.
 | 
              
            
          
          
            
            
            Successful Login
              A login attempt was successful.
            
              
                
                  | Event details | 
              
              
                
                  | Event name | login_success | 
                  
                    | Parameters | 
                        
                            
                              | is_suspicious | boolean
 
                                    The login attempt had some unusual characteristics, for example the user logged in from an unfamiliar IP address.
                                  Possible values:
                                 
                                      falseBoolean value false.
trueBoolean value true.
 |  
                              | login_challenge_method | string
 
                                    Login challenge method.
                                  Possible values:
                                 
                                      access_to_preregistered_emailA challenge requiring access to a verification email in the inbox.
assistant_approvalA challenge that lets the user approve authentication by a Google Assistant product.
backup_codeAsks user to enter a backup verification code.
captchaA challenge to distinguish humans from automated bots using captcha.
cnameA challenge that requires the user to prove ownership of a domain by changing the CNAME record at their hosting provider.
cross_accountA challenge that lets products start an authentication session on one device under the primary account, delegate it for completion under another account, and then receive credentials for the session on the original initiating device owned by the primary account.
cross_deviceA challenge that requires the user to complete authentication on a secondary device.
denyUser sign-in is denied.
device_assertionA challenge based on recognizing a previously used device.
device_preregistered_phoneA challenge that requires the user to verify their phone number on the device. It's currently only used in username recovery and isn’t intended for use in other authentication flows.
device_promptA challenge on the user’s mobile device.
extended_botguardA challenge that uses a series of additional verification steps to ensure human interaction.
google_authenticatorAsks user to enter OTP from authenticator app.
google_promptLogin challenge method Google Prompt.
idv_any_emailA challenge that requires the user to provide a code that Google sent to any email address they provided during the challenge.
idv_any_phoneUser asked for phone number and then enters code sent to that phone.
idv_preregistered_emailA challenge in which a code is sent to another email address the user provided before.
idv_preregistered_phoneUser enters code sent to their preregistered phone.
internal_two_factorLogin challenge method Internal Two Factor.
knowledge_account_creation_dateA challenge that requires the user to provide the approximate date their account was created.
knowledge_cloud_pinA challenge based on the user's cloud service PIN.
knowledge_date_of_birthA challenge that requires the user to provide the date of birth registered on their Google Account.
knowledge_domain_titleA challenge that asks the user to provide their domain title (organization name).
knowledge_employee_idLogin challenge method Knowledge Employee Id.
knowledge_historical_passwordA challenge that lets the user enter either current or previous passwords. When this challenge is used, KNOWLEDGE_PASSWORD will refer only to the current password.
knowledge_last_login_dateA challenge that asks the user the approximate date of their last sign-in.
knowledge_lockscreenA challenge which allows users to enter the lock screen knowledge factor on an eligible device.
knowledge_preregistered_emailUser proves knowledge of preregistered email.
knowledge_preregistered_phoneUser proves knowledge of preregistered phone.
knowledge_real_nameA challenge that requires the user to provide the name(first name, last name) as registered on their Google account.
knowledge_secret_questionA challenge that requires the user to provide the answer to a question they chose.
knowledge_user_countA challenge that asks the user to provide number of users in the domain.
knowledge_youtubeA challenge based on the user's knowledge of their YouTube account details.
login_locationUser enters from where they usually sign in.
manual_recoveryThe user can recover their account only with their admin’s help.
mathA challenge requiring the solution of a mathematical equation.
noneNo login challenge was faced.
offline_otpUser enters OTP code they get from settings on their phone (android only).
oidcA challenge that uses the OIDC protocol.
otherLogin challenge method other.
outdated_app_warningA warning page, designed as a challenge, that notifies the user that they may be using an outdated version of an application. The user has the option to proceed.
parent_authA challenge requiring authorization from a parent or guardian.
passkeyA challenge that uses FIDO2 compliant passkeys or security keys to verify the user’s identity.
passwordPassword.
recaptchaA challenge that protects the user against spam and other types of automated abuse with reCAPTCHA v2 API.
rescue_codeA challenge that allows the user to enter their rescue code, which is a 32 character alphanumeric string that the user is expected to keep safe, and use it to recover their account.
same_device_screenlockA challenge that requires the user to unlock the device on which they are trying to sign in or perform a sensitive action.
samlThe user provides a SAML assertion from a SAML identity provider.
security_keyUser passes the security key cryptographic challenge.
security_key_otpLogin challenge method Security Key OTP.
time_delayAn asynchronous challenge that sends a link by email once a defined hold period has elapsed.
userless_fidoA FIDO challenge that’s not tied to a specific user.
web_approvalA challenge that lets the user scan a QR code using their Apple iOS device’s native camera, and use web approval for sign-in.
 |  
                              | login_type | string
 
                                    The type of credentials used to attempt login.
                                  Possible values:
                                 
                                      exchangeThe user provides an existing credential and exchanges it for another type—for example, exchanging an OAuth token for a SID. May  indicate that the user was already logged into a session and the two sessions were merged.
google_passwordThe user provides a Google account password.
reauthThe user is already authenticated but must reauthorize.
samlThe user provides a SAML assertion from a SAML identity provider.
unknownLogin type Unknown.
 |  | 
                
                  | Sample request | GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/login?eventName=login_success&maxResults=10&access_token=YOUR_ACCESS_TOKEN
 | 
                  
                    | Admin Console message format | {actor} logged in
 |