Policies Keys Report
The Policies Keys Report shows the list of keys used by the CTE policies. A key can be used by multiple policies, similarly, a policy can have multiple keys. You can download the report as a PDF or CSV document, as required. Refer to Downloading the Report.
Use the "Search by" box to search for records in the report by Policy Name, Key Name, or Domain. When searching for records by domain names, specify the complete and exact domain name including case-sensitivity. For example, searching for "test", "test-domain", and "Test-Domain" will return different search results.
Viewing the Report
To view the Policies Keys Report:
Open the Transparent Encryption application.
In the left pane, click Reports. The Reports page is displayed.
Click the Clients Policies tab.
The report shows all or some of the following columns:
Column | Description |
---|---|
Domain | Name of the CipherTrust Manager domain to which the record belongs. The Domain Sharing Data toggle does not affect the Policies Keys report. |
Policy Name | Name of the policy. |
Policy Type | Type of the policy. The type can be: • Standard • Live Data Transformation • Cloud Object Storage • In-place Data Transformation • CSI |
Key Name | Key used by the policy. |
Downloading the Report
Download the report as a PDF or CSV document. Based on the displayed columns and applied filters, the downloaded report shows all or some of the columns listed in Viewing the Report.
To download the Policies Keys Report:
Open the Transparent Encryption application.
In the left pane, click Reports. The Reports page is displayed.
Click the Clients Profiles tab.
Download the report:
Click Download CSV to download the report as a CSV file. The file is named
cte_policies_keys_<TIMESTAMP>.csv
, for example, cte_policies_keys_2021-01-12T07_11_57Z.csv.Important Note on CSV Reports
If the names of CTE resources include special characters like equals (
=
), plus (+
), minus (-
), at (@
), tab (0x09
), and carriage return (0x0D
), the resources are renamed in the downloaded CSV reports by applying the following rules:Every cell is wraped in double quotes
Every cell is prepended with a single quote
Every double quote is escaped using an additional double quote
For example, a resource named
=A+B'" ;,=C+D
is renamed as"'=A+B'"" ;,=C+D"
in the downloaded CSV report.Click Download PDF to download the report as a PDF file. The file is named
cte_policies_keys_<TIMESTAMP>.pdf
, for example, cte_policies_keys_2021-01-12T07_13_23Z.pdf.
The downloaded PDF document shows the Report Name as Policies Keys Report and time the report is Generated At.