17.4 Enabling Reporting

To enable the reporting feature, perform the following steps:

  1. Enable Events: Enable Application Access, Federate Request Sent, Federation Request Handled, Login Consumed, Login Consumed Failed, Risk-based Authentication Succeeded, Risk-based Authentication Failed, and Risk-based Authentication Action Invoked events.

    For information about how to enable the Application Access event, see Enabling Access Gateway Audit Events.

    For information about how to enable Federation Request Sent, Federation Request Handled, Login Consumed, Login Consumed Failure, Risk-based Authentication Succeeded, Risk-based Authentication Failed, and Risk-based Authentication Action Invoked events, see Enabling Identity Server Audit Events.

    The following table lists Access Manager reports and associated events:

    Name of Report

    Description

    Event

    Component

    NetIQ Access Manager Application Access Summary

    Summary of applications accessed at a specified time

    Application Access

    Access Gateway

    NetIQ Access Manager User Application Access Summary

    Users who accessed a particular application at a specified time

    Application Access

    Access Gateway

    NetIQ Access Manager Application Specific User Access

    Number of applications accessed by a specific user at a specified time

    Application Access

    Access Gateway

    NetIQ Access Manager Federation Summary

    Users who accessed a federated service at a specified time

    Federation Request Sent and Federation Request Handled

    Identity Server

    NetIQ Access Manager User Login Contract Summary

    Number of user login based on authentication contracts at a specified time

    Login Consumed

    Identity Server

    NetIQ Access Manager User Login Failure Report

    Number of failed login attempts and their reasons

    Login Consumed Failure

    Identity Server

    NetIQ Access Manager Application Specific Risk based Authentication Report

    Number of risk-based authentication attempts and the action taken for each attempt at a specified time for a specific application.

    Risk-based Authentication Succeeded

    Risk-based Authentication Failed

    Risk-based Authentication Action Invoked

    Identity Server

  2. Configure the IP Address of Sentinel Server or Sentinel Log Manager in Access Manager: Perform the following steps:

    1. Log in to Access Manager.

    2. Click Auditing.

    3. Specify the following details:

      Server Listening Address: Specify the Sentinel server IP address.

      Port: Specify the default port of NetIQ Access Manager Collector.

    4. Click Apply > OK.