Sample Reports

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Nov 25, 2019
Version 17Show Document
  • View in full screen mode

This section provides sample reports using the following report templates:

  • All Users
  • Users with Tokens
  • Administrators with Fixed Passcode
  • Authentication Activity
  • List All Authentication Agent Records
  • List All Installed Agents
  • System Log

Sample All Users Report

The All Users report provides information about users in your deployment. You can filter results based on input values such as custom user attributes, security domain, or group.

For example, you can generate a report to list all users in a specific department, if the department is defined as a custom user attribute.

In this example, Departments is a custom user attribute with Human Resources, Finance and IT as predefined values.

Suppose you want to generate a report that lists all users in the Human Resources department along with their User ID, Last Name, Email, and Locked Out status. On the Add a New Report page, select Departments and Human Resources in the Custom User Attribute field. Enter the search string as Human Resources. Include the following columns under Show in Report:

The following figure shows the report output. The column headers highlighted in red are the same as those defined in the Add Report page.

As another example of the All Users report, suppose you want to list all users who have been assigned a fixed passcode. On the Add a New Report page, the Has Fixed Passcode column has been selected to indicate which users in the report have been assigned a fixed passcode, and the Has Fixed Passcode input parameter field is set to Yes.

The following figure shows the report output. Because the Has Fixed Passcode field was set to Yes, only users with fixed passcodes are listed in the report.

Sample Users with Tokens Report

The Users with Tokens report provides a list of users who are assigned tokens. You can narrow the search using input parameter values such as customer user attributes.

For example, suppose you want to generate a report that lists the User ID, First Name, Last Name of users in the Human Resources department, and the lockout status of each account. Specify the output columns and input parameters as shown in the following figure.

The following figure shows the report output. The column headers highlighted in red are the same as those defined in the Add New Report page.

As another example of the Users with Tokens report, suppose you want to generate a list all users who have software tokens. On the Add New Report page, select the Token Type column, and set the Token Type input parameter field to SecurID Software Token.

The following figure shows the report output. Users with two software tokens are listed twice.

Sample Administrators with Fixed Passcode Report

The Administrators with Fixed Passcode report lists all administrators who have been assigned a fixed passcode.

In this example, the report is running for All security domains, including subdomains, and the output will not display email addresses, although this could be useful information, or the Yes column, which always displays Yes to indicate that each administrator in the report has been assigned a fixed passcode.

The following figure shows the report output. The User's Timestamp column indicates when the fixed passcode was assigned to each administrator or when the administrator last authenticated with the fixed passcode.

Sample Authentication Activity Report

The Authentication Activity report helps you track the following types of authentication activities:

  • Security and Operations Console login
  • Users with tokens
  • Agents on the server

For example, suppose you want to generate an authentication activity report that lists the User ID, Date and Time of authentication, Result of the attempt, and type of activity that took place across multiple identity sources. Specify the output columns and input parameter values as shown in the following figure.

The following figure shows the report output. The column headers highlighted in red are same as those defined in the Add New Report page.

Sample List All Authentication Agent Records Report

The List All Authentication Agent Records report provides information on the authentication agents that have been added to RSA Authentication Manager. For example, you can view the user groups and security domains assigned to each agent, how many times each authentication agent is installed in your deployment, and whether each agent is enabled or disabled.

The Installed Agent Count lists how many authentication agents that use the REST protocol are installed for each Authentication Manager agent record. One REST protocol authentication agent record in Authentication Manager can represent more than one installed agent. For example, you can install and configure the RSA Authentication Agent 8.0 or later for PAM on hundreds of servers, and then add the PAM agent one time in Authentication Manager. In this example, you can edit one authentication agent record to configure multiple installed agents. The Installed Agent Count does not apply to authentication agents that use the UDP protocol, and some REST protocol agents, such as the PAM Agent 8.0 or later, require additional configuration steps to send agent details to Authentication Manager.

The following figure shows the report output. All of the agents are enabled.

Each authentication agent in the report has one agent record in Authentication Manager. However, the Installed Agent Count column displays 0 for the RADIUS Server agent that is not installed in the Authentication Manager deployment, and 2 for a Standard Agent in the Application_Admin user group because that agent is deployed in two locations. Only REST Protocol authentication agents can provide the additional parameter that Authentication Manager uses for the Installed Agent Count. Authentication agents that use the UDP protocol does not provide the additional parameter, and so the Installed Agent Count would be 0 for such agents.

Sample List All Installed Agents Report

The List All Installed Agents report provides the following details for each installed authentication agent in your deployment that has corresponding record in Authentication Manager:

  • Version number
  • Platform
  • Hostname and IP address that was last used. The IP address is obtained from the machine on which the agent is installed or from proxy-related HTTP headers, such as X-Forwarded-For (XFF), if your deployment uses an HTTP proxy or a load balancer.
  • Time and date of the last authentication
  • Security domain
  • Name of the corresponding authentication agent record in Authentication Manager.

In the following example, the Software Identifier column is selected for the report. Some newer authentication agents that use the REST protocol provide a unique identifier for each installed agent. An agent might have one record in Authentication Manager, but the agent can be installed on multiple machines with a unique identifier for each installation. Authentication agents that use the UDP protocol do not provide this information. Some REST protocol agents require additional configuration steps to send agent details to Authentication Manager.

Only some agents provide the information in the Version, Component, and Platform columns. All agents can provide information about their security domain and the last authentication.

In the following output, the first row displays dashes for information that an older authentication agent cannot provide. RSA Authentication Agent 8.0 for PAM provides the information. If the PAM agent does not send the requested information, then the field displays "Unknown" for that installed agent.

Sample System Log Report

The System Log report lists log entries from the system log. You can narrow the search to a specific time period using input parameter values.

For example, suppose you want to generate a report that lists the Result, Activity Result Key, Date and Time, and Description of events in the system log for the last one week. Specify the output columns and input parameters as shown in the following figure.

The following figure shows the report output. The column headers highlighted in red are same as those defined in the Add New Report page.

 

 

 

 

We want your feedback! Tell us what you think of this page.


Attachments

    Outcomes