You can generate reports to show the usage of individual applications that are configured
in your IBM® Security Verify tenant.
Before you begin
- You must have administrative permission or be a member of the
helpdesk group to complete this task.
- Log in to the IBM Security Verify
administration console as an Administrator.
About this task
Table 1. Application usage
Information |
Attributes |
Descriptions |
Application |
data.applicationid |
The identifier of application that was targeted by an event. |
User Name |
data.username |
The Unique identifier for logging in to Verify. It can be the same as
the email address of the user. |
Realm |
data.realm |
The identity source attribute that helps distinguish users from multiple identity sources
that have the same user name. This information is displayed in the tab, and in the Edit User dialog box.
For the following
identity sources:
- Cloud Directory, the realm
value is
cloudIdentityRealm .
- IBMid, the realm
value is
www.ibm.com .
- SAML Enterprise, the realm
value can be any unique name that you assigned when you created the identity source.
- OnPrem LDAP, the realm value can be any
unique name that you assigned when you created the identity source.
|
Client IP |
data.origin |
The IP address of the device that made the authentication request. The details contain an
X-Force IP report link to evaluate the threat value of the address. |
Result |
data.result |
Success or failure. |
Time Stamp |
time |
When the authentication request was made. |
Location |
geoip.region_name
geoip.country_name
|
The geographical location, region, and country, where the authentication request was
made. Note: The region might not display accurately because of the way your network is configured.
This is a known limitation.
|
Procedure
- Select .
-
Type or select an application name in the Application name field on the
Application usage tile and select the application from the menu. You can also
choose to select to view the usage report for all the applications. Select View
report.
The summary report for the current day displays
- The number of successful logins
- The number of failed logins
- The number of unique logins.
A scalable graphical representation of the number of successful logins for the selected time
period is displayed. The time period can be up to 90 days. The graph scale is based on the data sets
and the time is displayed as local time.
The application usage activity for individual users is
also displayed.
Select an event or an application to see the details associated with it. See
SSO event details. Note: If no
information is displayed, verify that users are entitled to the application. Select Check
entitlements.
-
Select Filters to filter the results.
You can search by
- Identity
- Filter selections are username, realm, and source type.
- Source
- Filter selections are client IP, location, result, device ID, managed device, and compliant
device.
- Event details
- Filter selection is application name, application type, provider ID, client ID, and redirect
URI.
You can use any combination of filters to refine your results. Select
Apply
filters to modify the report. The selected filters are displayed above the graph. You
can clear the filters by selecting the
Reset link.
Note: The search fields are
case-sensitive.
- Change the date range for the report.
Select the
From and
To dates to display the
calendar drop downs and select the dates for the report.
Note: The To date
cannot exceed the current date.
-
Select Run Report.
The Report information is refreshed.
- Optional:
If you ran the usage report on a specific application, select Login
counts to display the username, the realm, the login count for successful logins, and
the time stamp of the user's last login attempt.
The median number of logins is listed. Hover over the median login to see a list of
percentiles. You can also see the percentage of users that logged in at least a specified number of
times.
- Optional:
If you ran the usage report for all applications, select Login counts to
view a summary of the successful, failed, and unique logins for each of the applications.
- Optional: Generate a CSV file for the report.
- Click Generate CSV.
- Follow the directions in Downloading a CSV report.