Share and maintain your Apono reports
After creating reports to analyze your cloud access activities, you can distribute and maintain them. For each report, Apono enables you to perform the following actions:
Download the report in multiple formats
Share a link to the report data
Schedule automated delivery to recipients
Edit report settings including filters, formats, and schedules
View filtered activity data directly in the Activity tab
Delete unneeded reports
For example, you can create a report that tracks high-risk permission grants across your cloud resources, download it as a CSV for analysis, and schedule daily automated deliveries to your security team - ensuring timely oversight of sensitive access patterns.
Follow these steps to locate a report:
On the Reports tab, click the name of the report. The Edit Report page opens.
Select a Report Format.
CSV: (Default) Best for internal analysis, integrations, or bulk data processing
PDF: Recommended for compliance reporting that requires data immutability and integrity
Click Download to save the report to your device.
Users must have Apono UI access to view shared report links.
You can copy a shareable link to a report from either the Reports tab or the Edit Report page for a specific report.
Follow this step to share a report:
Follow these steps to share a report:
On the Reports tab, click the name of the report. The Edit Report page appears.
Click Copy report link. The URL to the report will be copied to your clipboard.
Before sharing a report, you can click View Activity to spot-check specific access records on the Activity tab to ensure accuracy. By viewing the underlying activity data, you can confirm permissions, investigate anomalies, and verify that the report includes all necessary details.
Follow these steps to schedule a report:
On the Reports tab, click the name of the report. The Edit Report page opens.
Under Schedule, enter a Cron expression to define how frequently the report is generated and emailed to recipients.
For assistance, see this cron generator to define the expression.
Select a report Format.
Enter a comma-separated list of Recipients to receive the report.
Click Save report.
Follow these steps to edit a report:
On the Reports tab, click the name of the report. The Edit Report page opens.
Edit one or more aspects of the report.
Change the Report name.
Adjust the data filters.
Adjust the schedule settings.
Click Save report.
Follow these steps to delete a report:
Click Yes. The report is deleted.
\
Learn how to filter and view access requests and user activity
If your organization uses a multi-cloud strategy, managing and auditing user activity can be challenging.
The Activity page consolidates all user activity into a single table that displays every access request controlled by Apono. From this page, you can easily manage access and activity:
Filter activity according to flexible dimensions, like grantee, integration, and status
View access request details
Revoke unwanted access
In addition to the actions above, you can also to audit activity.
The Activity page allows for advanced filtering to refine the data displayed in the table. You can filter the activity log by one or several of the following filters.
At any point while filtering, you can click Clear Filters to reset the table to its default view.
Follow these steps to view the details of an access request:
Select an access request. The Access request details panel appears. From here, you can view various access details depending on the resource or integration associated with the access request. Access details can include the fields below.
Click the X in the top right corner to close the panel.
Follow these steps to view the resources associated with an access request:
Under the Access request details, click Resources.
Click a status tab to view your resources.
Follow this step to view information related to the time and period of the access request:
Under the Access request details, click Timeline. A timeline of the access request appears.
From this timeline, you can see the exact date and time of when access was requested, when access was granted or revoked, when credentials were rotated, or when an error occurred.
On the Activity page, you can revoke all access to resources synced with Apono.
Revoking all access allows you to quickly and securely respond to scenarios like employee offboarding, compromised accounts, or security breaches, ensuring sensitive resources are protected from unauthorized access.
Follow these steps to revoke all access:
Click Yes. All access across your user activity is revoked.
On the Reports tab, in the row of the report, click (link icon). The URL to the report will be copied to your clipboard.
Before sharing a report, you can click (report icon) to spot-check specific access records on the Activity tab to ensure accuracy. By viewing the underlying activity data, you can confirm permissions, investigate anomalies, and verify that the report includes all necessary details.
On the Reports tab, in the row of the report, click (trash icon). A confirmation popup window appears.
. Only access requests matching the filters appear.
.
.
On the page, click Revoke All. A warning popup appears.
Grantee
Follow these steps to filter by grantee:
On the Activity page, click the Grantee dropdown menu.
(Optional) In the Search field, enter a value to filter the list of grantees.
Select one or more grantees.
Integration
Follow these steps to filter by integration:
On the Activity page, click the Integration dropdown menu.
(Optional) In the Search field, enter a value to filter the list of integrations.
Select one or more integrations.
Status
Follow these steps to filter by status:
On the Activity page, click the Status dropdown menu.
Select a status.
Access Flow Name
Follow these steps to filter by access flow name:
On the Activity page, click the More Filters dropdown menu.
Click Access Flow Name. The Access Flow Name dropdown menu appears.
(Optional) In the Search field, enter a name to filter the list of access flows.
Select one or more access flows.
Permission
Follow these steps to filter by permission:
On the Activity page, click the More Filters dropdown menu.
Click Permission. The Permission dropdown menu appears.
(Optional) In the Search field, enter a value to filter the list of permissions.
Select one or more permissions.
Resource
Follow these steps to filter by resource:
On the Activity page, click the More Filters dropdown menu.
Click Resource. The Resource dropdown menu appears.
(Optional) In the Search field, enter a name to filter the list of resources.
Select one or more resources.
Resource Type
Follow these steps to filter by resource type:
On the Activity page, click the More Filters dropdown menu.
Click Resource Type. The Resource Type dropdown menu appears.
(Optional) In the Search field, enter a value to filter the list of resource types.
Select one or more resource types.
Trigger Type
Follow these steps to filter by trigger type:
On the Activity page, click the More Filters dropdown menu.
Click Trigger Type. The Trigger Type dropdown menu appears.
Select a trigger type.
Resource Risk Level
Follow these steps to filter by resource risk level:
On the Activity page, click the More Filters dropdown menu.
Click Resource Risk Level. The Resource Risk Level dropdown menu appears.
(Optional) In the Search field, enter a value to filter the list of risk levels.
Select one or more risk levels.
Permission Risk Level
Follow these steps to filter by permission risk level:
On the Activity page, click the More Filters dropdown menu.
Click Permission Risk Level. The Permission Risk Level dropdown menu appears.
(Optional) In the Search field, enter a value to filter the list of risk levels.
Select one or more risk levels.
Access ID
Unique identifier of the access request
Creation date
Date when the user requested access
Access flow
Name of the access flow that controls access to the requested resource or integration
Access type
Means by which the access flow grants access (Self Serve or Automatic)
Grantee
Name and email address of the user who requested access
For more information on the grantee’s activity, click See Session Audit.
Duration
Requested duration of access
Justification
Reason for access
Granted
Resources to which access has been granted Follow these steps to view these resources:
Click the Granted tab. A list of resources appears.
In your desired resource tile, click the down caret ( ˅ ). The resource details expand.
From here you can view the resource-specific information:
Resource name
Resource type
Permissions
Date when access was granted
Revoked
Resources to which access has been revoked
Follow these steps to view these resources:
Click the Revoked tab. A list of resources appears.
In your desired resource tile, click the down caret ( ˅ ). The resource details expand.
From here you can view the resource-specific information:
Resource name
Resource type
Permissions
Date when access was revoked
Errors
Resources for which an access error has occurred
Follow these steps to view these resources:
Click the Errors tab. A list of resources appears.
In your desired resource tile, click the down caret ( ˅ ). The resource details expand.
From here you can view the resource-specific information:
Resource name
Resource type
Permissions
Date when the error occurred
Reason for error
In an evolving, compliance-driven environment, tracking and auditing user activity is crucial for maintaining the integrity and security of your organization. Apono activity management enables you to uphold both integrity and security.
Apono’s Activity page serves as a comprehensive tool, providing clarity and control to your organization by centralizing activity monitoring and enabling efficient troubleshooting. The Activity page helps you maintain compliance, troubleshoot access issues, and ensure seamless operations.
The Activity page offers insight into who accessed what, and when. This visibility is vital for the following:
Maintaining Compliance: Monitor access patterns to meet regulatory requirements.
Access Clarity: Instantly view active and historical access requests, ensuring you have complete transparency.
Troubleshooting Support: Resolve access issues promptly with detailed error messages and investigation tools.
The Activity page provides a complete timeline of when an access request was made, whether it was approved or denied, and why. This level of detail empowers admins to ensure that access aligns with organization policies and compliance.
Request Metadata
Comprehensive information, including full access details, grantee information, and access status
Cross-Environment Activity Search
Advanced filtering with flexible dimensions (access flow, resource type, risk level) that work uniformly across all access requests and activity reports
Access Reporting
Customizable reports that capture activity data in CSV or other formats
By providing detailed timelines, error messages, and status updates for every request, the Activity page equips you with data to act decisively. Whether you need to revoke active access or schedule reports, the Activity page makes every task manageable and efficient.
To learn more about leveraging Activity features for your organization, explore the following articles:
Learn how to build custom reports
Reports transform your Activity page data into customizable exports with precise filters.
By default, reports capture the last 30 days of activity data across all columns in CSV format. You can customize this using various filters and options:
Time Range: Choose between relative periods (last 7 days) or absolute date ranges
Access Filters: Filter by specific grantees, integrations, permissions, and risk levels
Column Selection: Control which data columns appear in your exports
Format Options: Generate reports in CSV or PDF formats
Apono's reports serve as access review documentation that meets compliance requirements:
SOC 2: Access oversight & audit trails
GDPR & HIPAA: PII protection & access monitoring
PCI DSS & SOX: Secure handling of financial data & reporting
You can schedule or generate on demand reports to support quarterly audits, compliance reporting, and security reviews. Read for more insights on this topic.
Follow these steps to create a report:
Enter a Report name.
(Optional) Select the Report Format. CSV is the default format.
CSV: (Default) Best for internal analysis, integrations, or bulk data processing
PDF: Recommended for compliance reporting that requires data immutability and integrity
(Optional) Filter the report data by one or several of the following filters.
As you apply filters, a sample of the report information appears and updates in real time under Preview (first 10 access requests). One access request may have multiple rows of data.
From the Show/Hide columns dropdown menu, select at least one column of data to display in the report.
Click Create report. The report will be saved and listed on the Reports tab.
On the tab, click Create Report. The Add Report page opens.
After creating a report, you can .