Reports
CipherTrust Manager provides easy-to-read reports containing details about cluster nodes, domains, certificates, and license usage. You can download these reports in CSV and PDF formats.
The reports can provide insights into various questions, such as:
What is the number of active and inactive cluster nodes, and what is their uptime?
How many domains exist under the root, and who are their respective administrators?
How many licenses are utilized at root and domain levels?
How many local or external certificates are currently available and in use at root and domain levels?
Report Types
Following types of reports are available in the CipherTrust Manager:
Cluster Nodes Report
This report provides a list of cluster nodes with the following details.
Field | Description |
---|---|
Node ID | Node ID of the cluster. |
Status | Active or inactive status of the cluster. |
Host | Host IP of the cluster. |
Port | Port number. |
Uptime | Time for which the cluster has been running. |
To view Cluster Nodes Report:
Log in to CipherTrust Manager console as a root user.
Select Admin Settings > Cluster.
Click the download icon next to Cluster.
Select Download As CSV or Download As PDF.
(Optional) Rename the report file.
Click Save.
Note
Cluster Node Reports are available only for the root users.
Domain Report
This report provides a list of domains with the following details.
Field | Description |
---|---|
Domain Name | Name of the domain. |
Domain ID | ID of the domain. |
Allow User Management | Information on whether creation and management of users is allowed. |
Anchored Domain | Information on whether domain is anchored to HSM. |
Meta | Additional reference information about the domain. |
The report helps in identifying first-level subdomains under the root domain and the respective admins who have access to those domains.
To view Domain Report:
Log in to CipherTrust Manager console as root user.
Select Admin Settings > Domains
Click the download icon next to Domains.
Select Download As CSV or Download As PDF.
(Optional) Rename the report file.
Click Save.
Note
Domain Reports are available only for the root users.
License Usage by Domain Report
This report provides the following license consumption details for a domain and all its subdomains. Only domains with at least one consumed license of any type are included in the report.
Field | Description |
---|---|
Domain ID | ID of the domain user using the license. |
Domain Name | Name of the domain user using the license. |
Parent Domain ID | ID of the parent domain. |
Parent Domain Name | Name of the parent domain. |
Transparent Encryption | Count of licenses used by CipherTrust Transparent Encryption (CTE). |
LDT | Count of licenses used by LDT (Live Data Transformation). |
CTE-KP | Count of licenses used by CTE-KP (Kubernetes Protection). |
CTE UserSpace | Count of licenses used by CTE UserSpace. |
CTE-RP | Count of licenses used by CTE-RP (Ransomware Protection). |
KMIP | Count of licenses used by KMIP. |
DPG | Count of licenses used by DPG (Data Protection Gateway). |
RESTful Data Protection | Count of licenses used by Restful Data Protection. |
CADP | Count of licenses used by CADP. |
BDT | Count of licenses used by BDT (Batch Data Transformation). |
CCKM | Count of licenses used by CCKM (CipherTrust Cloud Key Manager). |
To view License Usage by Domain Report:
Log in to CipherTrust Manager console.
Select Admin Settings > Licensing.
Click the download icon next to Licensing, and select License Usage By Domain Report.
Select Download As CSV or Download As PDF.
(Optional) Rename the report file.
Click Save.
Note
License Usage By Domain Reports are available for the root and domain users.
System License Usage Report
This report provides license usage details of the root domain. It shows the number of available and consumed licenses for all license types (including connectors).
Field | Description |
---|---|
Connector | Name of the connector. |
Total | Total number of licenses available for use. |
Used | Number of consumed licenses. |
The report also contains usage breakdown for various cloud units of CCKM (CipherTrust Cloud Key Manager).
To view System License Usage Report:
Log in to CipherTrust Manager console as a root user.
Select Admin Settings > Licensing.
Click the download icon next to Licensing, and select System License Usage Report.
Select Download As CSV or Download As PDF.
(Optional) Rename the report file.
Click Save.
Note
System License Usage Reports are available only for the root users.
Certificate Reports
CipherTrust Manager provides reports related to the CA (Certificate Authority) certificates provisioned for different domains (including the root domain) and subdomains. You can use these reports to view details of the certificates issued by local and external CAs, and their usage details from the client and interface perspective.
Local CA Report
This report provides a list of live and expired local CAs with the following details.
Field | Description |
---|---|
Name | Name of the local CA. |
State | State of the local CA (Active or Inactive). |
Serial Number | Serial number of the local CA. |
Subject | Subject to identify the entity associated with the certificate. |
Issuer | Issuer details of the local CA. |
Activation | Date and time of local CA activation. |
Expiry | Date and time of the local CA expiration. |
Client Authentication | Whether client authentication is enabled. |
User Authentication | Whether user authentication is enabled. |
To view Local CA Report:
Log in to CipherTrust Manager console.
Select CA > Local.
Click the Download icon next to Local Certificate Authorities.
Click Local CA Report or Expired Local CA Report, and select As CSV or As PDF.
(Optional) Rename the report file.
Click Save.
Local CA Certificates Report
This report provides a list of certificates corresponding to a local CA with the following details.
Field | Description |
---|---|
Name | Name of the local CA certificate. |
State | State of the local CA certificate (Active or Inactive). |
Serial Number | Serial number of the local CA certificate. |
Subject | Subject to identify the entity associated with the certificate. |
Issuer | Issuer details of the local CA. |
Activation | Date and time of certificate activation. |
Expiry | Date and time of certificate expiration. |
To view Local CA Certificates Report:
In the CipherTrust Manager console, select CA > Local.
Select any local CA from the list.
Click the Download icon next to Certificates issued by <local_ca_id>.
Click Local CA Certificates Report and select As CSV or As PDF.
(Optional) Rename the report file.
Click Save.
External CA Report
This report provides a list of external CAs with the following details.
Field | Description |
---|---|
Name | Name of the CA. |
Serial Number | Serial number of the CA. |
Subject | Subject to identify the entity associated with the certificate. |
Issuer | Issuer details of the CA. |
Activation | Date and time of the CA activation. |
Expiry | Date and time of the CA expiration. |
Client Authentication | Whether client authentication is enabled. |
User Authentication | Whether user authentication is enabled. |
To view External CA Report:
Log in to CipherTrust Manager console.
Select CA > External.
Click the download icon next to External Certificate Authorities.
Select Download As CSV or Download As PDF.
(Optional) Rename the report file.
Click Save.
Clients Report
This report provides a list of clients and their corresponding certificates with the following details.
Field | Description |
---|---|
ID | ID of the client. |
Name | Name of the client. |
Created At | Date and time of client creation. |
Certificate ID | Certificate associated with the client. |
Client State | Active or inactive status of the client. |
Client Type | Type of the registered connector client such as CTE, Application Data Protection, or kmip client. |
Certificate Issuer | Name of the certificate issuer . |
Certificate Subject | Additional information about the certificate. |
Client Hostname | Hostname of the client. |
Certificate Expiry | Data and time of certificate expiration. |
To view Clients Report:
Log in to CipherTrust Manager console.
Select Access Management > Client Hub.
Click the download icon next to Client Hub.
Select Download As CSV or Download As PDF.
(Optional) Rename the report file.
Click Save.
Interface Report
This report provides a list of interfaces and their corresponding CA details with the following details.
Field | Description |
---|---|
Name | Name of the interface. |
Mode | Interface mode to identify whether TLS is enabled and whether the password is required or is optional for TLS connections. |
Certificate User Field | Certificate field that identifies a user or a connector client connected with an interface. |
Autogen CA | Auto-generated Certificate Authority associated with the interface. |
External Trusted CAs | External CA associated with the interface. |
Local Trusted CAs | Local CA associated with the interface. |
Port | Port number. |
Network Interface | NIC card or virtual interface in use for communication. |
Type | Type of the registered connector client such as CTE, Application Data Protection, or kmip client. |
Certificate Expiry Date | Data and time of certificate expiration. |
Minimum TLS Version | Minimum supported TLS version. |
Maximum TLS Version | Maximum supported TLS version. |
To view Interface Report:
Log in to CipherTrust Manager console.
Select Admin Settings > Interfaces.
Click the download icon next to Interfaces.
Select Download As CSV or Download As PDF.
(Optional) Rename the report file.
Click Save.
Users Report
Two types of user reports can be generated:
All Users Report - Lists details of all users.
Admin Only Users Report - Lists details of admin users. The admin users are part of system admin groups such as "Key admins".
This report provides the following details.
Field | Description |
---|---|
Username | Name of the user. |
Full Name | Full name of the user. If full name is not provided explicitly while creating the user, the username appears as a full name in the report. |
User ID | Id of the user. |
Email address of the user. | |
Last Login Time | Time when user was last logged in. |
Groups | Groups the user is part of such as All Clients. |
Auth Domain ID | ID of auth domain. |
Auth Domain Name | Name of auth domain. |
Created At | Date and time of user creation. |
Expires At | Data and time of user expiration. |
Allowed Client Types | Allowed client types such as unregistered, public, and confidential. |
Allowed Auth Methods | Allowed auth methods such as password. |
To view User Report:
Log on to CipherTrust Manager console.
Select Access management > Users.
Click the download icon next to Users.
Select Users Report to view the all users reports.
Select Show Admins Only checkbox to view the Admin only users reports and click Download CSV or Download PDF.
(Optional) Rename the report file.
Click Save.
Keys Report
This report provides a list of keys with the following details.
Field | Description |
---|---|
ID | ID of the key. |
Name | Name of the key. |
Owner | Owner of the key. |
Created At | Date and time of key creation. |
Modified Date | Date and time when key was last modified. |
State | Status of the key such as Active or Deactivated. |
Type | Type of the key such as Symmetric Key or Asymmetric Key. |
Version | Key version number. |
Algorithm | Algorithm used such as DES. |
Size | Size of the key such as 256. |
Description | Description of the key. |
Key Check Value | Key check value (KCV) of the key. |
Exportable | Displays whether key is Exportable. |
Deletable | Displays whether key is Deletable. |
Aliases | Alias name of the key. |
Activation Date | Activation date and time of the key. |
Process Start Date | Date and time when a managed symmetric key object may begin to be used to process cryptographically protected information (for example, decryption or unwrapping) |
Protect Stop Date | Date and time after which a managed symmetric key object shall not be used for applying cryptographic protection (for example, encryption or wrapping). |
Deactivation Date | Deactivation date and time of the key. |
Destroy Date | Date and time the key was destroyed. |
Compromise Occurrence Date | Date and time when the key was first believed to be compromised, if known. Only valid if the revocation reason is CACompromise or KeyCompromise , otherwise ignored. |
Compromise Date | Date and time when the key was considered compromised. |
Archive Date | Date and time the key got archived. |
To view Keys Report:
Log on to CipherTrust Manager console.
Go to Keys.
Click the download icon next to CipherTrust Keys.
Select Download CSV or Download PDF.
(Optional) Rename the report file.
Click Save.