Applications

On this page you will see a list of all integrated SaaS applications, and apart from showing the applications list, this table holds very important and easy-to-access information about your SaaS applications. Here is a breakdown of all the information the applications table includes: i. Users As the name suggests, this column holds the total number present on that particular application. ii. Shadow Apps This column holds the total number of discovered applications (apps) authorized from that particular application. iii. Scope Risk This column holds the overall scope's risk for that particular application. Scope Risk is the well-calculated risk of all of the authorized scopes of discovered applications. iv. Issues This column holds the total number of open issues for that particular application. v. Severity Similar to Scopes Risk, this column holds the overall severity of open issues for that particular application. vi. Posture This column holds the overall posture of that particular application. Posture is a % scale; this is a result of considering all risk factors for that application.
The application logo has another superseding logo on the top right corner suggesting that the application is managed by that IDP.
The IDP name can be confirmed by hovering over the Application logo - It would give you the "Managed By - IdpName".
Download
You can also download the application list in a CSV format.

When clicking an Application name, a side drawer will appear, which contains detailed information about the application.

Here is a breakdown of all the information the Applications side drawer includes:
Overview
The overview has multiple parts sharing different types of information. The first section includes the following types of information. Here is a breakdown of the information :
Issues Trend Graphical Representation of open issues.
Issue Severity This section shows the overall severity of the application with the number of open issues.
Scope Risk This section shows the overall scope risk of the application with the number of delegated scopes.
Users This section shows the total number of users present in that particular application.
Issues
This table shares the list of checks performed for that application. By hovering over the rule, you'll see the rule name and description. You can find full details about it by either clicking on the Name or by pressing the three dots and clicking Show More.
Rule
This comprises a list of checks performed for that application and category indicated by a specific icon. It's followed by Security Domain.
Pass Checks This indicates the number of data points that satisfy the rule condition. As an example, if an identity rule runs against an application with 100 users and the number of identities secured as per this rule is 70, then the pass checks would display it as 70.
Issues This indicates the data points that fail the rule condition. For example, if the rule is of type shadow application with critical scopes, and a user has 3 such applications, the number of issues would be 3.
Users This would include the total size of the sample against which the rule is applicable. It would be blank in case of Misconfiguration. It varies as per the rule.
Severity The security team assigns severity to the issue based on risk.
Users
This tab contains a list of users with various types of information. Here is a breakdown of the information :
Name Identifier of the account
MFA Users with MFA enrolled will be marked Enabled in green or disabled in red unless data is not supported.
Shadow Apps As the name suggests, this column holds the total number of authorized discovered applications (apps) through the respective user account.
Devices This column holds the total number of devices on which the respective user account is being used.
Roles This column holds the total number of roles that the respective user is assigned to.
Issues As the name suggests, this column holds the total number of open issues for the respective user.
Severity This column holds the overall severity.
Last Login
This indicates the last time the user logged into that application. Remember to sync the application for the most updated information. Special Indicators:
Application administrators and privileged users are highlighted with a crown icon.
Users consuming a paid license would be highlighted with a dollar sign.
NHI accounts are highlighted using the terminal icon.
Provisioned Applications [In case of IdP only] This section gives the names of applications and users of those applications that are managed by IdP.
Roles
Role Name The Names of the Roles found in that particular application
Role Category It tells the power an entity with Role can exercise - Read, Write, Admin, or Super Admin
Role Type It tells whether the role is generically provided by the application developer or a custom-made role by the application user.
Users It tells the count of users discovered having that role based on the instance of the application integrated.
Selecting the dropdown provides you with details of users, associated issue count, and the highest severity.
Details
This tab contains information about the SaaS application integrated like all available features that perimeters provide for the Integration, Namespace/Instance integrated, connection status of multiple sync types supported, the time of last sync, and the Application Owner. This tab also includes an action button to manually sync the application integration.
Last updated