Generating an application usage report
You can generate reports to show the usage of individual applications that are configured in your IBM® Verify tenant.
Before you begin
- You must have administrative permission or be a member of the helpdesk group to complete this task.
- Log in to the IBM Verify administration console as an Administrator.
About this task
| Information | Attributes | Descriptions |
|---|---|---|
| Application | data.applicationid |
The identifier of application that was targeted by an event. |
| User Name | data.username |
The Unique identifier for logging in to Verify. It can be the same as the email address of the user. |
| Realm | data.realm |
The identity source attribute that helps distinguish users from multiple identity sources
that have the same user name. This information is displayed in the tab, and in the Edit User dialog box. For the following
identity sources:
|
| Client IP | data.origin |
The IP address of the device that made the authentication request. The details contain an
X-Force IP report link to evaluate the threat value of the address. |
| Result | data.result |
Success or failure. |
| Time Stamp | time |
When the authentication request was made. |
| Location |
|
The geographical location, region, and country, where the authentication request was
made. Note: The region might not display accurately because of the way your network is configured.
This is a known limitation. |