diff --git a/src/main/java/de/thm/arsnova/config/SecurityConfig.java b/src/main/java/de/thm/arsnova/config/SecurityConfig.java
index 3c986bb74a6893e78e5341a1d2862d4a72c2be3f..f0c380d48e091a9e22d6e86732364d720bf7157b 100644
--- a/src/main/java/de/thm/arsnova/config/SecurityConfig.java
+++ b/src/main/java/de/thm/arsnova/config/SecurityConfig.java
@@ -1,5 +1,8 @@
 package de.thm.arsnova.config;
 
+import java.util.ArrayList;
+import java.util.List;
+
 import javax.servlet.ServletContext;
 
 import org.jasig.cas.client.validation.Cas20ProxyTicketValidator;
@@ -61,6 +64,8 @@ import de.thm.arsnova.security.DbUserDetailsService;
 @EnableGlobalMethodSecurity(prePostEnabled = true)
 @EnableWebSecurity
 public class SecurityConfig extends WebSecurityConfigurerAdapter implements ServletContextAware {
+	private final Logger logger = LoggerFactory.getLogger(SecurityConfig.class);
+
 	private ServletContext servletContext;
 
 	@Value("${root-url}") private String rootUrl;
@@ -108,24 +113,32 @@ public class SecurityConfig extends WebSecurityConfigurerAdapter implements Serv
 
 	@Override
 	protected void configure(AuthenticationManagerBuilder auth) throws Exception {
+		List<String> providers = new ArrayList<>();
 		if (dbAuthEnabled) {
+			providers.add("user-db");
 			auth.authenticationProvider(daoAuthenticationProvider());
 		}
 		if (ldapEnabled) {
+			providers.add("ldap");
 			auth.authenticationProvider(ldapAuthenticationProvider());
 		}
 		if (casEnabled) {
+			providers.add("cas");
 			auth.authenticationProvider(casAuthenticationProvider());
 		}
 		if (googleEnabled) {
+			providers.add("google");
 			auth.authenticationProvider(googleAuthProvider());
 		}
 		if (facebookEnabled) {
+			providers.add("facebook");
 			auth.authenticationProvider(facebookAuthProvider());
 		}
 		if (twitterEnabled) {
+			providers.add("twitter");
 			auth.authenticationProvider(twitterAuthProvider());
 		}
+		logger.info("Enabled authentication providers: {}", providers);
 	};
 
 	@Bean