Reports
Reports provide access to logged information, and current information about the users, administrators, and system activity in a deployment. This information is useful for troubleshooting, auditing security issues, and demonstrating compliance with various policies.
You create a report using one of the supplied templates. Each template allows you to choose the types of information being reported and the parameters to apply in order to refine that information. For example, you can use the All Users template to create a report that generates a list of all the users in your deployment by first and last name who are enabled for risk-based authentication.
After you have created and saved a report, an administrator can run the report manually at any time. For instructions, see Run a Report Job. You can also schedule the report to run automatically on a given day and time. For instructions, see Schedule a Recurring Report Job.
You can view the report output in the Security Console, or download the report as a CSV, XML, or HTML file.
RSA Authentication Manager inserts a blank (space) character before any CSV file report field that starts with an equals to (=), plus (+), minus (-), or at (@) character. This prevents spreadsheet programs, such as Microsoft Excel, from interpreting the data as a formula.
Reports Permitted for Each Administrative Role
Administrative permissions determine which reports each administrator can run. Each predefined administrative role has default reporting permissions.The following table lists the default permissions for the predefined administrative roles, and the reports that each role has permission to run. You can modify a predefined role if you want it to have broader scope.
Note: Administrators who do not have view permissions for security domains have limited reporting capabilities. RSA recommends that you allow administrators to view security domains.
Administrator Role | |||||
Report Name | Help Desk Admin | User Admin | Agent Admin | Security Domain Admin | Super Admin |
Administrator Activity |
|
|
|
| X |
Administrators of a Security Domain |
| X | X | X | X |
Administrators with a Specified Role |
|
|
| X | X |
Administrators with Fixed Passcode |
| X | X | X | X |
Agents not updated by auto-registration more than a given number of days |
| X | X | X | X |
Agents with Unassigned IP Address |
| X | X | X | X |
All User Groups |
| X | X | X | X |
All Users |
| X | X | X | X |
Authentication Activity |
|
|
|
| X |
Distributed Token Requests |
|
|
|
| X |
Expired User Accounts |
| X | X | X | X |
Imported Users and Tokens Reports |
| X | X | X | X |
List all RADIUS clients |
|
|
| X | X |
| List All Authentication Agent Records | X | X | X | X | |
| List All Installed Agents | X | X | X | X | |
List all RSA Agent with assigned RADIUS client/RADIUS server |
| X | X | X | X |
List all RSA Agents with assigned RADIUS profile |
| X | X | X | X |
List all User Alias |
| X | X | X | X |
List all Users with assigned RADIUS profile |
| X | X | X | X |
Object Lifecycle Activity (Non User/User Group) |
|
|
|
| X |
Risk-Based Authentication (RBA) Activity |
|
|
|
| X |
Risk-Based Authentication (RBA) Users |
| X | X | X | X |
Software Token |
| X | X | X | X |
System Log Report |
|
|
|
| X |
Token Expiration Report |
| X | X | X | X |
User and User Group Lifecycle Activity |
|
|
|
| X |
User and User Groups Missing from Identity Source |
| X | X | X | X |
Users Enabled for On-Demand Authentication |
| X | X | X | X |
Users Enabled for On-Demand Authentication Who Have Never Logged In |
| X | X | X | X |
Users never logged in with token |
| X | X | X | X |
Users with days since last login using specific token |
| X | X | X | X |
Users with Disabled Accounts |
| X | X | X | X |
Users with Tokens |
| X | X | X | X |
Users with tokens set to online emergency access tokencode |
| X | X | X | X |
Related Articles
Duplicate a Report 6Number of Views Sample Reports 31Number of Views Reports Permitted for Each Administrative Role 23Number of Views Delete an Identity Attribute Definition 16Number of Views Custom Reports 70Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle