Applications
Last updated
Last updated
On this page you will see a list of all integrated SaaS applications, and apart from showing the applications list, this table holds very important and easy-to-access information about your SaaS applications, Here is a breakdown of all the information the applications table includes: i. Users As the name suggests, this column holds the total number present on that particular application. ii. Shadow Apps This column holds the total number of discovered applications (apps) authorized from that particular application. iii. Scopes Risk This column holds the overall scopes risk for that particular application. Scopes Risk is the well-calculated risk of all of the authorized scopes to discovered applications. iv. Issues This column holds the total number of open issues for that particular application. v. Severity Similar to Scopes Risk, this column holds the overall severity of open issues for that particular application. vi. Posture This column holds the overall posture of that particular application. Posture is % scale, this is a result of considering all risk factors for that application.
Provisioning
There is a provision to enable/disable viewing applications provisioned by a particular IdP.
The application logo having another superseding logo on the top right corner suggests that the application is managed by that Idp.
The Idp name can be confimed by hovering over Application logo - It would give you the "Managed By - IdpName".
Download
You can also download the application list in a CSV format.
When clicking an Application name a side drawer will appear, this contains detailed information about the application.
Here is a breakdown of all the information the Applications side drawer includes:
Overview
Overview has multiple parts sharing different types of information, the first section includes four types of information, here is a breakdown of the information : i. Issue Severity This section shows overall severity of the application with the number of open issues. ii. Scopes Risk This section shows overall scopes risk of the application with number of delegated scopes. iii. Discovered Apps This section shows number of discovered applications (apps) with the % of approved applications. iv. Users This section show the total number of users present in that particular application.
Open Issues
As the name suggests, this section shows the number of all open issues based on severity and on the right hand side issue activity with a graph view.
On the middle section you'll find various tabs, these tabs share detailed information about Issues, Users, Discovered Apps, Scopes and Details.
Issues
As the name suggests, this table shares the list of open issues along with the Failed Rule Name (issue), Issue Count, User who can fix the issue and severity. By hovering over the rule you'll see the rule name and description. You can find full details about the issue by either cllicking on Issue Name or by pressing the three dots and clicking Show More.
Users
This tab contains a list of users with various type of information, here is a breakdown of the information : i. Shadow Apps As the name suggests, this column holds total number of authorized discovered applications (apps) through the respective user account. ii. Devices This column holds total number of devices on which the respective user account is being used. iii. Roles This column holds total number of roles that the respective user is assigned to. iv. Issues As the name suggests, this column holds total number of open issues for the respective user. v. Severity This column holds the overall open issues' severity. Application administrators and high-privileged users are highlighted with a crown icon.
Roles
i. Role Name
The Names of the Roles found in that particular application
ii. Role Category
It tell the power an entity with Role can exercise - Read, Write, Admin or Super Admin
iii. Role Type:
It tells if the role is generically provided by application developer or a custom made role by application user.
iv. Users
It tells the count of users discovered having that role based on the instance of the application integrated.
Selecting the dropdown provides you with details of users, associated issue count and highest severity.
Shadow Apps
This tab contains a list of discovered applications found through that particular application, this list includes different types of important information about the discovered applications (apps), here is a breakdown of the information : i. Users As the name suggests, this column holds the total number of users from the application who authorized the discovered application.
ii. Trust The trust score is calculated based on various security parameters against which the shadow app is scrutinized.
iii. Scopes This column holds the number of total unique scopes that the discovered application (app) was authorized to. iv. Risk This column holds the well-calculated risk of the discovered application. This Risk is being calculated based on the scopes the discovered application was authorized to. v. Approval Status This column holds information about the approval status of the discovered application. Perimeters' Application Administrators can add, modify or remove the approval status for the Shadow Applications.
Scopes
This tab contains a list of unique scopes along with some very important information, here is a breakdown of the information : i. Name Name or Scope names are standardized from perimeters to make them understandable. Perimeters' scope name involves the Resource and the Access type or level to the resource. ii. Discovered Apps As the name suggests, this column holds the logo of discovered applications that authorized the scope through the application. iii. Resource This column holds the name of the resource to which the scope gives access. iv. Type This column holds the access type or level that the scope requests like Read, Write or Admin. v. Risk As the name suggests, this column holds the overall risk that the scopes pose to an organization.
Details
This tab contains information about the SaaS application integrated like all available features that perimeters provide for the Integration, Namespace/Instance integrated, connection status, the time of last sync, and the Application Owner. This tab also includes an action button to manually sync the application integration.