The IBM® Security Privileged Identity Manager solution supports
the IBM Cognos® reporting framework for
report generation.
Available reports
The
reporting
package includes the following reports:
- Shared Access Entitlements by Owner Report
- This report shows the credentials
and credential pools that are owned by the selected owner.
- Shared Access Entitlements by Role Report
- This report shows
the information
about the credentials and credential pools that are entitled by the
selected role.
- Shared Access Entitlement Definition Report
- This report shows the configuration
information of Privileged IDs and
the Shared Access Policies that
are associated with these Privileged IDs.
- Shared Access History Report
- This report shows the history
of actions that are performed on the shared credentials.
- Single Sign-On Privileged ID Audit Report
- This report provides a log history
of check-out and check-in actions that
are performed for each Privileged ID on the
managed resource. This report also includes a subreport that is called User Activity Audit Report.
With this subreport, you can play back the user session recording
or view the terminal commands that the user executed on the managed
resource.
- Privileged Session Recorder Report
- This report shows the history
of activities that occurred in the Privileged Session Recorder console sorted
by User Name.
You can use this report to track and monitor the actions of the selected
user in the Privileged Session Recorder console.
For BIRT-based shared access reports, see Tivoli Common Reporting.
Report data overview
Report
data is staged through a data synchronization process. The process
gathers data from the directory information store and prepares it
for the reporting engine. You can run data synchronization on demand
or scheduled it on a regular basis.
The generated reports are
based on the most recent data synchronization, not on current data.
Activities that occur after the last completed data synchronization
are captured by the next data synchronization. Data in the reports
is obtained from the database and the directory server.
To generate
a report, you must synchronize data at least one time. The report
data is based on the most recent data synchronization and is only
as accurate as the report data from that synchronization.
For
more information, see "Data synchronization" from the IBM Security Identity Manager Administration
Guide, "Report administration" section.