sso.hwcinfra.com
Open in
urlscan Pro
170.250.252.199
Public Scan
Submitted URL: https://hotwirecommunications.ultipro.com/
Effective URL: https://sso.hwcinfra.com/saml-idp/1o213643ryx2d8ue/login/?idp_init=1
Submission: On May 18 via api from US — Scanned from DE
Effective URL: https://sso.hwcinfra.com/saml-idp/1o213643ryx2d8ue/login/?idp_init=1
Submission: On May 18 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="login_form" action="" method="post" autocomplete="off" class="p-4 p-md-5 border rounded-3 bg-light">
<input type="hidden" name="csrfmiddlewaretoken" value="u8I4n3CkvW4rFsZKybuelcA3zrRwEeMDV8fj8dpNgp6t8aCpKoXeUiBa0AV7laAd">
<div>
<div>
<p></p>
</div>
</div>
<div class="form-floating mb-3">
<p><strong>Single-Sign-On (SSO): Identity Services</strong></p>
<p>Login with your Hotwire Communications credentials</p>
<input class="form-control" id="id_username" placeholder="firstname.lastname" maxlength="253" name="username" type="text" value="">
<span id="id_username_display" style="display:none" class="field username_display"></span>
</div>
<div class="form-floating mb-3">
<input type="password" class="form-control" id="id_password" placeholder="Password" name="password">
</div>
<input type="hidden" name="" value="">
<button class="w-100 btn btn-lg btn-primary" type="submit" value="Login">Login</button>
<div id="iam_login_link" style="display: none;">
<a href="#" id="iamLogin">Sign-In as IAM user</a>
</div>
<div>
<p style="color:red;"></p>
</div>
</form>
Text Content
UKG Single-Sign-On (SSO): Identity Services Login with your Hotwire Communications credentials Login Sign-In as IAM user -------------------------------------------------------------------------------- AUTHENTICATION DISCLAIMER This is a private computer system. Unauthorized access or use is prohibited and subject to prosecution and/or disciplinary action. All use of this system constitutes consent to monitoring at all times and users are not entitled to any expectation of privacy. If monitoring reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification of the user, may be provided to law enforcement officials. If monitoring reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of this system are subject to appropriate disciplinary action.