Generating an application usage report Application usage report

You can generate reports to show the usage of individual applications that are configured in your IBM® Security Verify tenant.

Before you begin

  • You must have administrative permission or be a member of the helpdesk group to complete this task.
  • Log in to the IBM Security Verify administration console as an Administrator.

About this task

Table 1. Application usage
Information Attributes Descriptions
Application data.applicationid The identifier of application that was targeted by an event.
User Name data.username The Unique identifier for logging in to Verify. It can be the same as the email address of the user.
Realm data.realm The identity source attribute that helps distinguish users from multiple identity sources that have the same user name.

This information is displayed in the Users & Groups > Users tab, and in the Edit User dialog box.

For the following identity sources:
  • Cloud Directory, the realm value is cloudIdentityRealm.
  • IBMid, the realm value is www.ibm.com.
  • SAML Enterprise, the realm value can be any unique name that you assigned when you created the identity source.
  • OnPrem LDAP, the realm value can be any unique name that you assigned when you created the identity source.
Client IP data.origin The IP address of the device that made the authentication request. The details contain an X-Force IP report link to evaluate the threat value of the address.
Result data.result Success or failure.
Time Stamp time When the authentication request was made.
Location
  • geoip.region_name
  • geoip.country_name
The geographical location, region, and country, where the authentication request was made.
Note: The region might not display accurately because of the way your network is configured. This is a known limitation.

Procedure

  1. Select Reporting & diagnostics > Reports.
  2. Type or select an application name in the Application name field on the Application usage tile and select the application from the menu. You can also choose to select to view the usage report for all the applications. Select View report.
    The summary report for the current day displays
    • The number of successful logins
    • The number of failed logins
    • The number of unique logins.

    A scalable graphical representation of the number of successful logins for the selected time period is displayed. The time period can be up to 90 days. The graph scale is based on the data sets and the time is displayed as local time.

    The application usage activity for individual users is also displayed. Select an event or an application to see the details associated with it. See SSO event details.
    Note: If no information is displayed, verify that users are entitled to the application. Select Check entitlements.
  3. Select Filters to filter the results.
    You can search by
    Identity
    Filter selections are username, realm, and source type.
    Source
    Filter selections are client IP, location, result, device ID, managed device, and compliant device.
    Event details
    Filter selection is application name, application type, provider ID, client ID, and redirect URI.
    You can use any combination of filters to refine your results. Select Apply filters to modify the report. The selected filters are displayed above the graph. You can clear the filters by selecting the Reset link.
    Note: The search fields are case-sensitive.
  4. Change the date range for the report.
    Select the From and To dates to display the calendar drop downs and select the dates for the report.
    Note: The To date cannot exceed the current date.
  5. Select Run Report.
    The Report information is refreshed.
  6. Optional: If you ran the usage report on a specific application, select Login counts to display the username, the realm, the login count for successful logins, and the time stamp of the user's last login attempt.
    The median number of logins is listed. Hover over the median login to see a list of percentiles. You can also see the percentage of users that logged in at least a specified number of times.
  7. Optional: If you ran the usage report for all applications, select Login counts to view a summary of the successful, failed, and unique logins for each of the applications.
  8. Optional: Generate a CSV file for the report.
    1. Click Generate CSV.
    2. Follow the directions in Downloading a CSV report.