The Reports page displays report data that details how your end usersIn Okta literature, we generally refer to "end users" as the people who have their own Okta home page (My Applications), using chiclets to authenticate into all of their apps. End users do not have any administrative control. When we refer to "users" we are generally referring to the individual(s) who have administrative control. leverage their Okta accounts. Data includes information such as appAn abbreviation of application. Essentially, it is a web-based site used to perform any number of specific tasks, and requires authentication from end users by signing in. usage and access, deprovisioning details, and the exposure of suspicious activity, including OpenID Connect events.
In addition to the generated reports, there are several System Log queries available.
To run any report, click the report name, enter the parameters at the top of the screen, and finally click Run Report. After running a report, click the Download CSV link to obtain a csv version.
The following reports are available from this page.
The Okta Usage report contains data about who has signed into Okta, how many times and the dates of last login for the past 30 days. When you click on the report, it allows you to specify the range.
The Application Usage report contains data about how much an application is being used by user/group over a specified time range. To run the report, click the report name.
Other reports in this section provide reporting on applications in use as well as important security actions for each.
App Password Health
The App Password Health Report opens a page that allows admins who have the proper permissions to view apps to evaluate their app password health and act on it by asking usersIn Okta literature, we generally refer to "users" as the people who serve as Okta administrators. When we refer to "end users" we are generally referring to the people who the administrators serve. That is, those who use Okta chiclets to access their apps, but have no administrative control. to reset their application passwords.App Password Health Report Details
The App Password Health page allows admins who have the proper permissions to view apps to evaluate their app password health and act on it by providing
- The number of end-users using a given app
- The elapsed time since the last time you requested a password change for this app
- Quick communication to end-users from a push of the Ask user to reset button
- A CSV report to track end-user compliance by showing the latest time an end user logged into an app, and the last time the user updated the app password in Okta
Not all apps will appear on this page. Only your SWAAn acronym for Secure Web Authentication. SWA is a SSO system developed by Okta to provide single sign-on for apps that don't support proprietary federated sign-on methods or SAML. Users can enter their credentials for these apps on their homepage. These credentials are stored such that users can access their apps without entering their credentials each time. When users first sign-in to a SWA app from their homepage, they see a pop-up message asking if they were able to sign-in successfully. apps that are active, have at least one user or group assigned to them, and where you selected "User sets username and password" in the app setup, appear in this list.
Note: In a SWA app in which the user sets the username and password, the last login time and last app password reset are not captured if the user goes directly into the app.
SAMLAn acronym for Security Assertion Markup Language, SAML is an XML-based standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider (SP). The SAML standard addresses issues unique to the single sign-on (SSO) solution, and defines three roles: the end user, the IDP, and the SP. Capable Apps
You can review all your apps to see if you have any opportunities to convert existing SWA apps to SAML. The SAML Capable Apps report opens a page that shows all apps that you can convert from SWA to SAML. The page has a button for each app take you to the app to begin the process.
Because end users sign in to SAML apps by signing into Okta, app passwords are not required. This reduces this risk of an app being compromised. It's also more convenient for your end users, since they don't need to manage the app passwords.
Rogue Accounts Report
This is an Early Access feature. To enable it, please contact Okta Support.
The Rogue Accounts report compares assignments in Okta to accounts that exist in a specified app and lists the discrepancies. You can find the accounts that were created directly in the application without going through Okta and correct them to ensure all access to the app is managed through Okta. Once corrected, you will only have to look in one place to see who has access and what type of access for all the applications that you manage.
Auth Troubleshooting reports provide links to pre-defined queries in our System Log about the following authentication events:
- Okta Logins (Total, Failed)
- SSOAn acronym for single sign-on. In a SSO system, a user logs in once to the system and can access multiple systems without being prompted to sign in for each one. Okta is a cloud-based SSO platform that allows users to enter one name and password to access multiple applications. Users can access all of their web applications, both behind the firewall and in the cloud, with a single sign in. Okta provides a seamless experience across PCs, laptops, tablets, and smartphones. Attempts
- Auths Via AD AgentA software agent is a lightweight program that runs as a service outside of Okta. It is typically installed behind a firewall and allows Okta to tunnel communication between an on-premises service and Okta's cloud service. Okta employs several agent types: Active Directory, LDAP, RADIUS, RSA, Active Directory Password Sync, and IWA. For example, users can install multiple Active Directory agents to ensure that the integration is robust and highly available across geographic locations. (Total, Failed)
The Ask Users to Reset Button
When you click the Ask Users to Reset button, users are sent a request to update their passwords for the appropriate app(s). This notification comes in the form of a banner on their Home page, as shown below.
The banner appears the next time your end-users sign into Okta. Once viewed, end-users can easily remove the banner, and it does not reappear unless another password reset is requested.
The CSV Report Button
Click the CSV report button to download a report that details the users of the app, the last known login to this app, and the last time they updated the app password in Okta. View this report to monitor users who have complied with the request, and those who have yet to change their app passwords.
Note: The values in this report only apply to users who use SSO through Okta to sign into the app. Users who sign into the app directly are not tracked.
The CSV Report of All Password Resets Button
This report is a composite of the Ask users to reset button and the CSV report button.
Applications Access Audit
This is an Early Access feature. To enable it, please contact Okta Support.
The Applications Access Audit section contains the following two reports: Current Assignments and Recent Unassignments..
The Current Assignments report contains data about how an application is being used over a specified time range. It shows which users are assigned a specified app and all the apps assigned to a specified user. This report is not recommended for apps with more than 50,000 assigned users, as downloading the CSV report may take up to 15 minutes. If you navigate away from the download page, the download stops.
Note: Only visible if any unassigned orgs exist.
The Recent Unassignments report shows which users were unassigned from an app for a specified period. Enter an app by typing the first letter of the app and then selecting from the list that appears, and then enter the beginning and ending dates for the report. You can only run this report for one app at a time. Downloading the CSV report may take up to 3 minutes. If you navigate away from the download page, the download stops.
The MFA Usage report details Multifactor Authentication status and usage. This report shows all the MFA factors in Okta and the usage, by user. A user can have multiple entries in this report, if that user has many MFA factors configured. You can run the report for all users or for a single user. If you do not enter a user, selecting Run Report generates the report for all users.
The Yubikey report contains data about user, Yubikey serial number and status for a specified period.
The Suspicious Activity report contains data about suspicious events such as failed logins and locked out users over a specified time range. The report includes information about the time, login (user), clientEssentially, a client is anything that talks to the Okta service. Within the traditional client-server model, Okta is the server. The client might be an agent, an Okta mobile app, or a browser plugin. IP (user computer), and type of suspicious event that occurred.
The Deprovision Details report contains data about user, application deprovsioned from and resolution over a specified time range.
The SMS Usage report contains data about domestic and international SMS usage for the orgAn abbreviation of organization, but can also be thought of as a company. A company that uses Okta as their SSO portal is generally referred to as an org. As an administrator, you decide how Okta should be displayed and/or integrated with your org..