Skip to content

Search Overview

IdentityNow's Search allows you to find information about almost anything in your site. For example, you can find:

  • Users who have something in common, such as privileged access, or accounts on a particular source.
  • Users with specific access, such as two related entitlements.
  • Details about user access, such as all access profiles a specific user has.

To start searching your data, select Search. Selecting the search bar displays recent and suggested searches. As you enter a query, a list of fields displays.

In addition to finding information about your environment, you can also use Search to:

Select the Filter icon to filter your results by Identities, Entitlements, Events, and other Search categories. You can use the Column Chooser icon to refine your view.

Tagging items that can be searched helps you retrieve them more easily. For example, you can tag highly privileged roles, access profiles, and entitlements to make them easier to find and track. You can also tag items related to PCI or SOX compliance to simplify certification creation and management.

You can tag the following searchable items in IdentityNow:

  • Access Profiles
  • Entitlements
  • Identities
  • Roles

You can have up to 500 different tags in your site. A tag association is a pairing of 1 tag with 1 object, and you can apply up to 10,000 tag associations. Thus, an object with 500 tags consumes 500 tag associations.

To apply tags to searchable items:

  1. Go to Search.

  2. Write a search query to return the items you want to tag.

  3. Select the checkboxes next to the items you want to tag and select the Tags icon Tags.

    Search results with the number of tags each item has. Selecting a checkbox beside a result allows you to add tags.

    You can also open the Tags overlay for a single item by selecting the number of tags in its Tags column.

  4. Add your tags one at a time in the Add Tags field, pressing Enter or return between each tag.

    Note

    Tags must be between 3 and 128 characters. Valid characters include A-Z, 0-9, and underscores _. Tags are automatically converted to uppercase, and spaces are converted to underscores.

    Typing a tag into the text box. A list of existing tags matching the typed characters displays below.

    Each item can have up to 30 tags. To remove a tag from an item, select the X icon next to the tag.

  5. When you're finished, select Save.

You can now search for items with that tag using tags:<term>.

Choosing Tag Terms

Work with your governance experts and security teams to establish a list of tags that are most expressive of governance objects and access managed by IdentityNow, such as:

  • Risk levels
  • Remediation urgency levels
  • Affected departments
  • Compliance and regulatory categories

Search Categories

Each search category represents a type of data you can search for in IdentityNow. You can view results by category using the tabs at the top of the table.

  • Identities - Search the correlated and uncorrelated identities you have in IdentityNow.
  • Roles - Search roles.
  • Access Profiles - Search access profiles.
  • Entitlements - Search the entitlements you've loaded into IdentityNow.
  • Events - Search for certain audit events in your system. These audit events use a normalized name and include additional information about each event.
    • Attribute sync events are treated as Events in Search because of their lower impact and higher frequency.
  • Account Activity - Account activity covers most activity that IdentityNow completes on source accounts. You'll see the following types of actions when you search for account activity:
    • Access Request - Search on access requests.
    • Account Attribute Update - Search for events that involved updating a single attribute on an account.
    • Account State Update - Search for events that involved locking or unlocking an account on a source.
    • Certification - Search for events involving removing an entitlement from a user as a result of the entitlement being revoked during a certification.
    • Cloud Automated <Lifecyclestate> - Search automated lifecycle state changes that resulted in an identity being assigned to a different lifecycle state. The <Lifecyclestate> variable will be replaced with the name of the lifecycle state that the identity moved to.
    • Identity Attribute Update - Search on the times when an identity's attribute was updated within IdentityNow as the result of a provisioning action. When updating an identity attribute also updates an identity's lifecycle state, you'll also see the event Cloud Automated <Lifecyclestate>. Updates to identity attributes that occur as a result of an aggregation are not included in Account Activity.
    • Identity Refresh - Search identity refreshes that happen whenever a user gets a new role, an identity profile is updated, or an app is assigned to users based on that app being assigned to All Users From Source or Specific Users From Source.
    • Lifecycle State Refresh - Search the actions that took place when a lifecycle state was changed. This event only occurs after Cloud Automated <Lifecyclestate> or Lifecycle State Change.
    • Lifecycle State Change - Search account activity that resulted in an identity being manually assigned to a null lifecycle state.
    • Password Change - Search password changes on sources.

Search Glossary

Our documentation uses specific terminology to refer to different parts of a search query. This terminology is defined below.

Query

Everything you enter into the search bar is your query. By adjusting your query, you narrow down your results.

Query Examples
attributes.location:austin
@access(displayName:administrator AND source.name:IdentityNow

Term

The words you use in a query to specify the results you want. The results that are returned contain your terms.

Description Example
"Active directory" is the search term. "active directory"
"Austin" is the term. The rest of the query consists of fields. attributes.location:austin

Field

Specifying a field in your search query is similar to telling Search which folder you'd like to look in. It's a way of telling Search where it should look for the term. All searchable items have fields.

Description Example
"Name" is the field on the right, specifying that this query only searches in the name field for the term "donald.hernandez". name:donald.hernandez
This query specifies to search in the attributes field for a second field called location. attributes.location:austin
This query searches within the attributes field for the location field, and the manager field for the the name field. attributes.location:austin AND NOT manager.name:"Amanda Ross"

First-Level Field

The deepest category you can search in is the first-level field. This is always the field physically closest to your terms in a search query. In our JSON data models, the first-level field is the key in a key/value pair. In other words, first-level fields contain actual data, as opposed to more fields.

Description Example
Name is the first-level field on the right. In queries with only a single field, that's always a first-level field. name:donald.hernandez
Location is the first-level field because it's the field describing the actual data. attributes.location:austin
The query on the right contains the first level fields name, privileged, and entitlementCount. @access(source.name:"Directory" AND privileged:true) AND entitlementCount:>15

Operator

To combine different terms and attributes of a search category in your query, you can use operators. Operators determine how to run your query and how the results are calculated.

IdentityNow supports the operators AND, OR, and NOT.

Description Example
This query uses the operator OR to return all identities that are in either Austin or Houston. attributes.location:austin OR attributes.location:houston
This query uses AND to return identities with access in a source containing the word "Directory" in its name, that has any privileged access, as well as having 15 or more total entitlements. @access(source.name:"Directory" AND privileged:true) AND entitlementCount:>15

Object

In JSON, an object is any field that, instead of containing data, contains more fields. This means that second-level fields, third-level fields, and nested-level fields are all objects.

Description Example
Attributes is an object because it contains the first-level field "firstName." attributes.firstName:kari
Both access and source are objects. "Source" is an object that contains the field "name." "Access" is an object that contains all the fields enclosed in parentheses after it. This means that "access" is an object that contains the object "source" and the fields "name" and "privileged." @access(source.name:"Directory" AND privileged:true) AND entitlementCount:>15

Second-Level Field

Second-level fields are a type of object. Each second-level field contains a specific set of first-level fields. They're always followed by a period, a first-level field, and the search term.

Description Example
Attributes is the second-level field in this query because it contains the first-level field "location." attributes.location:london
Source is the second-level field on the right. It contains the first-level field "name." It's contained within the nested object "accounts." @accounts(source.name:AD)

Third-level fields are similar, referring to objects that contain both second- and first-level fields. At this time, these are only found in the account activity data model.

Nested Object

Nested objects can contain any number of fields in them. They represent an object contained within the data about another object, such as an account object in the identity object.

Queries for nested objects are always preceded by an @ symbol and followed by a set of parentheses containing any additional fields and the search terms.

Nested objects are treated differently than regular fields because any item in a searchable category could potentially have more than one of anything in a nested object. For example, an identity only has one displayName, so that's treated as a first-level field. However, an identity could have any number of accounts, so accounts is a nested object.

Description Example
In this query, accounts is the nested-level field. It contains the second-level field "source," which contains the first-level field "name." @accounts(source.name:AD)
AccountRequests is the nested-level field. It contains the first-level field "op," which is short for operation. @accountRequests(op:enable)
Access is the nested-level field. It contains the second-level field "source" and the first-level field "name," as well as the first-level field "privileged." Everything within the parentheses is within the nested field. @access(source.name:"Directory" AND privileged:true) AND entitlementCount:>15

Viewing Events

You can view your site's audit events in Search. Select an event to view more details about it.

 

 

Selecting an audit event in Search displays the name and technical ID of the event. The technical ID is unique to that event instance, and can be used to find it again.

The event's status is displayed, so you can see its progress. You can also view the user or system that initiated the event, as well as the target system the action is being performed on.

If the event contains special attributes, you can view those at the bottom of the panel.

Event Types

Each event is categorized into a type, so that you can search on related information easily. See below for the type as it appears on the event, its description, and a search query to return results of that type.

Type Description Search Query
AUTH Events related to any kind of authentication. type:auth
SSO Any events involving signing into an app using SSO. type:sso
PROVISIONING Audit events related to provisioning. type:provisioning
PASSWORD_ACTIVITY Events related to password changes within IdentityNow. type:password_activity
SOURCE_MANAGEMENT Events related to managing a source. type:source_management
ACCESS_REQUEST Audit events related to access request activity. type:access_request
USER_MANAGEMENT Events generated by a user or admin performing actions that impact a user's IdentityNow experience. type:user_management
CERTIFICATION Audit events related to certifications. type:certification
ACCESS_ITEM Any events related to changes made to entitlements, access profiles, or roles. type:access_item
SYSTEM_CONFIG Changes made at the org-level, such as adding new strong-authentication questions or branding. type:system_config
IDENTITY_MANAGEMENT Events generated by an admin performing management on an identity in the system. type:identity_management
NON_EMPLOYEE All events related to the management of non-employees, as configured in non-employee sources. type:non_employee

Event Statuses

You can search on an event's status to see whether it represents a completed action or failure.

Status Description Search Query
approved An access request was approved. status:approved
detected A system involved captured this event when a state changed. status:detected
escalated An access request was escalated by the system to a new reviewer. status:escalated
failed The event was captured when an action failed. status:failed
forwarded An access request was manually forwarded to another user. status:forwarded
ignored A request sent from the Password Interceptor was ignored. status:ignored
passed The event was completed successfully. status:passed
processed A request sent from the Password Interceptor was processed. status:processed
rejected An access request was rejected. status:rejected
started A job was started and hasn't been completed yet. status:started
terminated A system involved cancelled the request. status:terminated

Viewing Account Activity

Searching on account activity can give you insight into the actions IdentityNow performs on third-party systems. Select an account activity search result to view details about the action, such as the sources involved, errors or warnings, and the requestor and recipient of the action.

You can search on errors and warnings using fields in the @accountRequests object. Select a source to view details about the provisioning actions performed on it and their status, warnings or errors, and the account and attribute requests.

Account Activity Statuses

There are several types of statuses available in account activity. Each is searchable using a different query and refers to a different part of the action being performed.

Status

The status of an account action is its overall status. For example, if the status of an account attribute update action is complete, all modifications to the account have been finished, and all of the applicable account attributes were updated. Status can also be found in the list of account activity search results, using the column header Status.

Status Description Search Query
Complete

Approved actions have completed.

If an access request was rejected, the Completed badge will still display even though no account actions took place.

status:complete
Failure All actions related to this account activity failed. status:failure
Incomplete Some of the actions requested were completed successfully, but some failed. status:incomplete
Pending The account activity hasn't been attempted yet, but it's scheduled to be attempted. status:pending

Stage

The stage of an account action is its progress. This reflects whether IdentityNow still has actions ongoing related to the account activity or whether it's finished. Stage can also be found in the list of account activity search results, using the column header Stage.

Stage Description Search Query
Completed The action was confirmed on the source. stage:completed
Executing The action is in progress. stage:executing
Terminated The action was cancelled and won't be retried. stage:terminated

Account Request Status

The account request status is the status of each individual part of the larger action that was triggered in IdentityNow. For example, if you're looking at an account attribute update, IdentityNow might have attempted to update 4 different accounts related to a single user. Each source account being edited might have a different account request status. This data can be found by selecting an account action and navigating to one of the sources being updated.

Account Request Status Description Search Query
Pending The actions on the account are in progress. @accountRequests(result.status:pending)
Committed IdentityNow has sent the requests to the connector in question. @accountRequests(result.status:committed)
Finished IdentityNow has confirmed the results, whether successful or failed, on the source. @accountRequests(result.status:finished)
Unverifiable IdentityNow sent the request to the source, but the source's account schema doesn't have the attribute being provisioned. @accountRequests(result.status:unverifiable)
Failed The action failed and won't be retried. @accountRequests(result.status:failed)
Retry The action failed, but IdentityNow is going to try again. @accountRequests(result.status:retry)
Manual Task Created The action was requested on a source that isn't a direct connect source. We've created a manual task for the source owner. @accountRequests(result.status:"Manual Task Created")
IdentityNow Task The action was performed on IdentityNow successfully. @accountRequests(result.status:"IdentityNow Task")

Take a look at our additional Search documentation to learn more about what you can search on and how to build a query.