CONTEXA ZERO-TRUST

Post-Authentication Anomaly Detection

Compare normal user and account takeover in the same session after login

Live Connection
Connecting
Run ID -
Request ID -
Auth Carrier -
Auth Mode -
Token State -
Auth Subject -
1

Scenario Selection

Scenario
Normal User
Expected IP
192.168.1.100
User-Agent
Chrome 120 / Windows 11
Expected Action
ALLOW or LOW_RISK
Target Resource
Standard Resource / Low-sensitivity business access path

Run the same account in the same session and change only IP, browser, device, and auth state to compare post-authentication zero-trust verdicts.

2

Target / Execute

3

AI Verdict

PENDING
Risk-
Confidence-
Analysis Depth-
Env Fingerprint-
Reasoning

No evidence selected

AI Suggested Action

-

Immediate Response

Detail Data
{}

Screen-Server Consistency

No requests to verify yet.

Live Analysis Timeline

Request History

Server Record

Detail Data
{}

Analysis Basis

External Delivery Result

Evidence Preservation

Integrated Evidence Data
{}
Live Stream Preview
Not yet requested.