Back to Reports
Reports

Built-In Reports

28 views

title: Built-In Reports category: Reports tags: reports, built-in, security, compliance, audit, operational priority: Normal

Built-In Reports

IdentityCenter ships with 50+ built-in reports organized by category, accessible from the Reports Center at /admin/reports. These reports cover identity inventory, access governance, compliance, security, and audit needs out of the box.

Accessing the Reports Center

Navigate to Reports Center from the main administration menu. The page displays:

  • Total Reports -- Combined count of built-in and custom reports
  • Built-in Reports -- Reports included with IdentityCenter
  • Custom Reports -- Reports you have created with the Report Builder
  • Scheduled Reports -- Reports configured to run automatically

The left sidebar lists report categories. Click any category to filter the report list, or use the search bar to find reports by name or tag.

Report Categories

Reports are organized into the following categories:

Category Icon Focus Area Example Reports
Identity Users People and accounts All Identities, Disabled Identities, New Identities
Access Layer Group Groups and access rights All Groups, Empty Groups, Large Groups, Nested Membership
Compliance Balance Scale Policy and framework adherence Active Violations, SOX Summary, HIPAA Summary
Access Review Clipboard Check Certification campaigns Active Reviews, Pending Decisions, Overdue Reviews
Security Shield Privileged access and risk Privileged Accounts, Stale Accounts, Admin Membership
Sync Sync Synchronization health Sync Errors, Sync History, Object Inventory
Audit History Change tracking and evidence Review Decision History, Recent Changes

Identity Reports

Identity reports provide visibility into your workforce and account inventory.

Report Description Use Case
All Identities Complete list of all synced identities Workforce inventory
Identities Without Manager Identities with no assigned manager Detect orphan accounts
Identities Without Department Missing department assignments Data quality cleanup
Identities Without Email Accounts missing email addresses Communication gaps
Identities Without Job Title Missing job title data HR data completeness
Disabled Identities All disabled user identities Account cleanup candidates
Identities by Department Counts grouped by department Workforce analytics
Identities by Job Title Counts grouped by job title Role analysis
Identities by Location Counts grouped by office location Geographic distribution
Recent Identity Changes Modified in the last 30 days Change monitoring
New Identities Created in the last 30 days Onboarding tracking
Identities with Multiple Objects Linked to more than one directory object Multi-source correlation
All User Objects All user accounts from directory sources Account inventory
Unlinked Identities Identities with no linked directory objects Cleanup candidates
Contractor Identities External, contractor, and vendor accounts Third-party compliance

Access and Group Reports

Group reports help manage access governance and identify cleanup opportunities.

Report Description Use Case
All Groups Complete group inventory Access documentation
Empty Groups Groups with zero members Cleanup candidates
Large Groups Groups with 100+ members Broad access review
Groups Without Owner No designated owner Governance risk
Group Member Counts All groups with member totals Access analysis
Nested Group Membership Groups that are members of other groups Complexity analysis
Security Groups Groups without email (security type) Access control inventory
Distribution Groups Mail-enabled groups Email governance
Groups by Type Security vs. distribution breakdown Type analysis

Compliance Reports

Compliance reports support regulatory frameworks and policy management.

Report Description Use Case
Active Policy Violations All unresolved violations Daily operations
Violations by Severity Grouped by critical/high/medium/low Risk prioritization
Violations by Framework Grouped by compliance framework Framework assessment
SOX Compliance Summary Sarbanes-Oxley violations SOX audits
HIPAA Compliance Summary HIPAA-related violations Healthcare compliance
Remediated Violations Recently remediated (30 days) Prove follow-through
Policy Effectiveness Active, remediated, closed per policy Measure policy value
Compliance Trend Violation counts over time Trend analysis

Security Reports

Security reports surface privileged access and potential risk areas.

Report Description Use Case
Privileged Accounts Members of admin/privileged groups Security audit
Stale Accounts Accounts inactive beyond a threshold Attack surface reduction

Tip: Run the Privileged Accounts report weekly and the Stale Accounts report at least monthly to maintain a strong security posture.

Access Review Reports

These reports track certification campaign progress and outcomes.

Report Description Use Case
Active Access Reviews Currently running campaigns Status monitoring
Pending Review Decisions Assignments awaiting reviewer action Bottleneck identification
Overdue Access Reviews Campaigns past their due date Escalation triggers
Review Completion Rates Completion statistics per campaign Progress tracking
Revoked Access Access denied through reviews Remediation evidence
Review Decision History All decisions with timestamps Complete audit trail

Running a Report

  1. Navigate to Reports Center (/admin/reports)
  2. Select a category from the left sidebar or search by name
  3. Click the report name to open it
  4. Configure parameters if prompted (date range, department filter, object type)
  5. Click Run Report to execute
  6. View results in the data grid with sorting and filtering

Report Parameters

Many reports accept parameters to narrow results:

Parameter Type Control Example
Date range Date picker Last 30 days, custom range
Department Dropdown IT, Finance, HR
Object type Dropdown User, Group, Computer
Status Dropdown Active, Disabled, All
Text search Free text Name or username filter

Export Formats

Report results can be exported in multiple formats:

Format Best For Details
CSV Data analysis Raw data, opens in Excel or any spreadsheet tool
Excel Sharing with stakeholders Formatted with column headers and data types
PDF Executive summaries and auditors Printable, includes branding and report metadata

Favorites and Recent Reports

  • Favorites -- Star any report to add it to your Favorites list for quick access
  • Recent -- The Reports Center tracks your recently viewed reports automatically

Next Steps

Tags: reports built-in security compliance audit operational

Was this article helpful?

Related Articles

Report Export & Distribution
Custom Report Builder