LogoLogo
Documentation and Guides
Documentation and Guides
  • ABOUT APONO
    • Why Choose Apono
    • Security and Architecture
    • Glossary
  • GETTING STARTED
    • How Apono Works
    • Getting started
    • Access Discovery
    • Integrating with Apono
  • CONNECTORS AND SECRETS
    • Apono Integration Secret
    • High Availability for Connectors
    • Installing a connector with Docker
    • Manage integrations
    • Manage connectors
  • AWS ENVIRONMENT
    • AWS Overview
    • Apono Connector for AWS
      • Installing a connector on EKS Using Terraform
      • Updating a connector in AWS
      • Installing a connector on AWS ECS using Terraform
    • AWS Integrations
      • Integrate an AWS account or organization
        • Auto Discover AWS RDS Instances
        • AWS Best Practices
      • Amazon Redshift
      • RDS PostgreSQL
      • AWS RDS MySQL
      • Integrate with EKS
      • AWS Lambda Custom Integration
      • EC2 via Systems Manager Agent (SSM)
  • AZURE ENVIRONMENT
    • Apono Connector for Azure
      • Install an Azure connector on ACI using Azure CLI
      • Install an Azure connector on ACI using PowerShell
      • Install an Azure connector on ACI using Terraform
      • Updating a connector in Azure
    • Azure Integrations
      • Integrate with Azure Management Group or Subscription
        • Auto Discover Azure SQL Databases
      • Azure MySQL
      • Azure PostgreSQL
      • Integrate with AKS
  • GCP ENVIRONMENT
    • Apono Connector for GCP
      • Installing a GCP connector on Cloud Run using CLI
      • Installing a GCP connector on GKE using CLI (Helm)
      • Installing a GCP connector on GKE using Terraform
      • Updating a connector in Google Cloud
    • GCP Integrations
      • Integrate a GCP organization or project
      • CloudSQL - MySQL
      • CloudSQL - PostgreSQL
      • Google Cloud Functions
      • Integrate with GKE
      • AlloyDB
  • KUBERNETES ENVIRONMENT
    • Apono Connector for Kubernetes
      • Installing a connector on Kubernetes with AWS permissions
      • Updating a Kubernetes connector
    • Kubernetes Integrations
      • Integrate with Self-Managed Kubernetes
  • ADDITIONAL INTEGRATIONS
    • Databases and Data Repositories
      • Microsoft SQL Server
      • MongoDB
      • MongoDB Atlas
      • MongoDB Atlas Portal
      • MySQL
      • Oracle Database
      • PostgreSQL
      • Redis Cloud (Redislabs)
      • Snowflake
      • Vertica
      • MariaDB
    • Network Management
      • SSH Servers
      • RDP Servers
      • Windows Domain Controller
      • AWS EC2 SSH Servers
      • Azure VM SSH Servers
      • Installing the Apono HTTP Proxy
    • Development Tools
      • GitHub
      • Rancher
    • Identity Providers
      • Okta SCIM
      • Okta Groups
      • Okta SSO for Apono logins
      • Google Workspace (Gsuite)
      • Google Workspace (GSuite) Groups
      • Azure Active Directory (Microsoft Entra ID)
      • Azure Active Directory (Entra ID) Groups
      • Jumpcloud
      • JumpCloud Groups
      • OneLogin
      • OneLogin Group
      • LDAP Groups
      • The Manager Attribute in Access Flows
      • HiBob
      • Ping Identity SSO
    • Incident Response Integrations
      • Opsgenie
      • PagerDuty
      • VictorOps (Splunk On-Call)
      • Zenduty
    • ChatOps Integrations
      • Slack integration
      • Teams integration
      • Backstage Integration
  • WEBHOOK INTEGRATIONS
    • Webhooks Overview
    • Anomaly Webhook
    • Audit Log Webhook
    • Request Webhook
      • Custom Webhooks
      • Communications and Notifications
        • Slack Outbound Webhooks
        • Teams
        • Outlook and Gmail (Using Azure Logic App)
      • ITSM
        • Freshdesk
        • Jira
        • ServiceNow
        • Zendesk
        • Freshservice
        • ServiceDesk Plus
      • Logs and SIEMs
        • Coralogix
        • Datadog
        • Logz.io
        • Grafana
        • New Relic
        • SolarWinds
        • Sumo Logic
        • Cortex
        • Logpoint
        • Splunk
        • Microsoft Sentinel
      • Orchestration and workflow builders
        • Okta Workflows
        • Torq
    • Integration Webhook
    • Webhook Payload References
      • Audit Log Webhook Payload Schema Reference
      • Webhook Payload Schema Reference
    • Manage webhooks
    • Troubleshoot a webhook
    • Manual Webhook
      • ITSM
        • PagerDuty
  • ACCESS FLOWS
    • Access Flows
      • What are Access Flows?
    • Create Access Flows
      • Self Serve Access Flows
      • Automatic Access Flows
      • Access Duration
    • Manage Access Flows
      • Right Sizing
    • Revoke Access
    • Dynamic Access Management
      • Resource and Integration Owners
    • Common Use Cases
      • Ensuring SLA
      • Protecting PII and Customer Data
      • Production Stability and Management
      • Break Glass Protocol
    • Create Bundles
    • Manage Bundles
  • ACCESS REQUESTS AND APPROVALS
    • Slack
      • Requesting Access with Slack
      • Approving Access with Slack
    • Teams
      • Requesting Access with Teams
      • Approving Access with Teams
    • CLI
      • Install and manage the Apono CLI
      • Requesting Access with CLI
    • Web Portal
      • Requesting Access with the Web Portal
      • Approving Access with the Web Portal
      • Reviewing historical requests with the Web Portal
    • Freshservice
    • Favorites
  • Inventory
    • Inventory Overview
    • Inventory
    • Access Scopes
    • Risk Scores
    • Apono Query Language
  • AUDITS AND REPORTS
    • Activity Overview
      • Activity
      • Create Reports
      • Manage Reports
    • Compliance: Audit and Reporting
    • Auditing Access in Apono
    • Admin Audit Log (Syslog)
  • HELP AND DEBUGGING
    • Integration Status Page
    • Troubleshooting Errors
  • ARCHITECTURE AND SECURITY
    • Anomaly Detection
    • Multi-factor Authentication
    • Credentials Rotation Policy
    • Periodic User Cleanup & Deletion
    • End-user Authentication
    • Personal API Tokens
  • User Administration
    • Role-Based Access Control (RBAC) Reference
    • Create Identities
    • Manage Identities
Powered by GitBook
On this page
  • Filter activity
  • View access request details
  • Revoke all access

Was this helpful?

Export as PDF
  1. AUDITS AND REPORTS
  2. Activity Overview

Activity

Learn how to filter and view access requests and user activity

PreviousActivity OverviewNextCreate Reports

Last updated 17 days ago

Was this helpful?

If your organization uses a multi-cloud strategy, managing and auditing user activity can be challenging.

The Activity page consolidates all user activity into a single table that displays every access request controlled by Apono. From this page, you can easily manage access and activity:

  • Filter activity according to flexible dimensions, like grantee, integration, and status

  • View access request details

  • Revoke unwanted access

In addition to the actions above, you can also to audit activity.

You can also using the Apono public API.


Filter activity

The Activity page allows for advanced filtering to refine the data displayed in the table. You can filter the activity log by one or several of the following filters.

At any point while filtering, you can click Clear Filters to reset the table to its default view.

Filter
Description

Grantee

Follow these steps to filter by grantee:

  1. (Optional) In the Search field, enter a value to filter the list of grantees.

  2. Select one or more grantees.

Integration

Follow these steps to filter by integration:

  1. (Optional) In the Search field, enter a value to filter the list of integrations.

  2. Select one or more integrations.

Status

Follow these steps to filter by status:

  1. Select a status.

Access Flow Name

Follow these steps to filter by access flow name:

  1. Click Access Flow Name. The Access Flow Name dropdown menu appears.

  2. (Optional) In the Search field, enter a name to filter the list of access flows.

  3. Select one or more access flows.

Permission

Follow these steps to filter by permission:

  1. Click Permission. The Permission dropdown menu appears.

  2. (Optional) In the Search field, enter a value to filter the list of permissions.

  3. Select one or more permissions.

Resource

Follow these steps to filter by resource:

  1. Click Resource. The Resource dropdown menu appears.

  2. (Optional) In the Search field, enter a name to filter the list of resources.

  3. Select one or more resources.

Resource Type

Follow these steps to filter by resource type:

  1. Click Resource Type. The Resource Type dropdown menu appears.

  2. (Optional) In the Search field, enter a value to filter the list of resource types.

  3. Select one or more resource types.

Trigger Type

Follow these steps to filter by trigger type:

  1. Click Trigger Type. The Trigger Type dropdown menu appears.

  2. Select a trigger type.

Resource Risk Level

Follow these steps to filter by resource risk level:

  1. Click Resource Risk Level. The Resource Risk Level dropdown menu appears.

  2. (Optional) In the Search field, enter a value to filter the list of risk levels.

  3. Select one or more risk levels.

Permission Risk Level

Follow these steps to filter by permission risk level:

  1. Click Permission Risk Level. The Permission Risk Level dropdown menu appears.

  2. (Optional) In the Search field, enter a value to filter the list of risk levels.

  3. Select one or more risk levels.


View access request details

Follow these steps to view the details of an access request:

  1. Select an access request. The Access request details panel appears. From here, you can view various access details depending on the resource or integration associated with the access request. Access details can include the fields below.

Field
Description

Access ID

Unique identifier of the access request

Creation date

Date when the user requested access

Access flow

Name of the access flow that controls access to the requested resource or integration

Access type

Means by which the access flow grants access (Self Serve or Automatic)

Grantee

Name and email address of the user who requested access

For more information on the grantee’s activity, click See Session Audit.

Duration

Requested duration of access

Justification

Reason for access

  1. Click the X in the top right corner to close the panel.

View resources

Follow these steps to view the resources associated with an access request:

  1. Under the Access request details, click Resources.

  2. Click a status tab to view your resources.

Tab
Description

Granted

Resources to which access has been granted Follow these steps to view these resources:

  1. Click the Granted tab. A list of resources appears.

  2. In your desired resource tile, click the down caret ( Ë… ). The resource details expand.

From here you can view the resource-specific information:

  • Resource name

  • Resource type

  • Permissions

  • Date when access was granted

Revoked

Resources to which access has been revoked

Follow these steps to view these resources:

  1. Click the Revoked tab. A list of resources appears.

  2. In your desired resource tile, click the down caret ( Ë… ). The resource details expand.

From here you can view the resource-specific information:

  • Resource name

  • Resource type

  • Permissions

  • Date when access was revoked

Errors

Resources for which an access error has occurred

Follow these steps to view these resources:

  1. Click the Errors tab. A list of resources appears.

  2. In your desired resource tile, click the down caret ( Ë… ). The resource details expand.

From here you can view the resource-specific information:

  • Resource name

  • Resource type

  • Permissions

  • Date when the error occurred

  • Reason for error

View the timeline

Follow this step to view information related to the time and period of the access request:

  1. Under the Access request details, click Timeline. A timeline of the access request appears.

From this timeline, you can see the exact date and time of when access was requested, when access was granted or revoked, when credentials were rotated, or when an error occurred.


Revoke all access

On the Activity page, you can revoke all access to resources synced with Apono.

Revoking all access allows you to quickly and securely respond to scenarios like employee offboarding, compromised accounts, or security breaches, ensuring sensitive resources are protected from unauthorized access.

Follow these steps to revoke all access:

  1. Click Yes. All access across your user activity is revoked.

On the page, click the Grantee dropdown menu.

On the page, click the Integration dropdown menu.

On the page, click the Status dropdown menu.

On the page, click the More Filters dropdown menu.

On the page, click the More Filters dropdown menu.

On the page, click the More Filters dropdown menu.

On the page, click the More Filters dropdown menu.

On the page, click the More Filters dropdown menu.

On the page, click the More Filters dropdown menu.

On the page, click the More Filters dropdown menu.

. Only access requests matching the filters appear.

.

.

On the page, click Revoke All. A warning popup appears.

Activity
Filter your activity
View resources
View the timeline
Activity
Activity
Activity
Activity
Activity
Activity
Activity
Activity
Activity
Activity
create reports
list activity
Filtering on the Activity page
Access request details panel