Hello Pratik,
No, the only thing that I could as is the possibility to use cut-through proxy and then if the user authenticates and get denies then get a particular log message,
Besides that there is no way to show that,
Regards,
Hey, Remember to rate all of the helpful posts
Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC