Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 7.1 - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Enable or Disable Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions About us

Viewing event details

Additional detailed information is available for some activity events.

To see the details of a specific event

  1. Use one of the following method to view event details:

    • Double-click an event.

    • Select an event and click View Details.

  2. To close the event details pane, click Close.

Auditing request workflow

In addition to reviewing activity, you can use the Activity Center to audit the transactions that occurred during the request workflow process, from request to approval to review. For session requests, you can also play back a recorded or live session if Record Sessions is enabled in the entitlement's policy.

If you are an authorized reviewer, you can audit an access request's workflow of a completed request awaiting review from the Home page as well.

To audit request workflow

  1. Open the Activity Center, use the query options to specify the content of the report.

  2. Select an access request event and click Request Workflow Details to audit the transactions that occurred during the request's workflow from request to approval to review.

  3. For session requests that have Record Session enabled in the policy, click the button to access event session logs via SPS.

Sorting report results

Use the controls in the grid heading row to sort report results or rearrange the columns of data. An arrow in the column heading identifies the sort criteria and order, ascending or descending, being used to display information.

To sort columns

  1. Click the column heading to be used for the sort criteria.
  2. The sort order is in ascending order. To change it to descending order, click the heading a second time.

To change the columns that display

In the upper right corner, click Column to see a list of columns that can be displayed in the grid. Select the check box for data to be included in the report. Clear the check box for data to be excluded from the report. The additional columns available depend on the type of activity included in the report.

Entitlement reports

Security Policy Administrators, Auditors, and Application Auditors can run an entitlement report.

To export the data from an Entitlement report

  1. Navigate to Reports > Entitlements.

  2. From the top of the Entitlements page, select the tab for User, Asset, or Account.

    NOTE: The number indicated in the tab title shows the number of unique users, assets, or accounts. When you enter search criteria for the report, the number displayed on the tab will adjust accordingly.

  3. (Optional) Apply any desired filters to the table.

  4. You can then select to either export the data for all listed items or the data for a single item:

    • To export data for all items, select Export on the toolbar.

    • To export data for a single item, select an item and click View Details. From the details dialog, select Export.

  5. From the Export dialog, select to export the data as either a JSON or CSV file. For more information, see Exporting data. The time is set according to the user time zone.

  6. Click Export to generate the report file.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating