Skip to main content

Administration

The Administration section is accessible to users with the Administrator role. It covers user management, audit logging, API keys, system settings, authentication, and licence management.

User Management

Navigate to Administration > Users to manage user accounts.

User Roles

RoleDescription
AdministratorFull system access. Can manage users, settings, API keys, licence, and authentication configuration.
IAM Governance ManagerCan manage systems, credentials, scan policies, identities, privilege overrides, and PAM inventory. Cannot access administration settings.
IAM Governance AnalystRead-only access. Can view dashboards, reports, accounts, KRIs, and scan history. Cannot modify data.
Inherit from OIDC ClaimRole is determined by the SSO provider's role claim on each login. Only available when OIDC is configured.

Creating a User

  1. Click Add User
  2. Fill in:
FieldRequiredDescription
UsernameYesLogin username (must be unique)
Full NameYesDisplay name
EmailYesEmail address
RoleYesOne of the roles above
Initial PasswordYesTemporary password (user should change on first login)
  1. Click Save

User creation is subject to the licence limit on maximum users.

Managing Users

  • Deactivate - disables a user account (they cannot log in, but their audit history is preserved)
  • Activate - re-enables a deactivated account
  • Reset Password - sets a new temporary password for the user

Password Policy

Navigate to the Password Policy tab on the Users page to configure password requirements. See Configuration Reference for all available settings.

Audit Logs

Navigate to Administration > Audit Logs to view a complete record of all actions performed in OrbisID.

Each log entry contains:

FieldDescription
TimestampWhen the action occurred
UserWho performed the action
Action TypeCategory of action (e.g., USER_LOGIN, SYSTEM_CREATED, SCAN_EXECUTED)
TargetWhat was affected (e.g., system name, account ID)
DetailsJSON payload with additional context

Filtering Audit Logs

Use the filters to narrow results:

  • Action Type - select from a dropdown of all action types
  • Date Range - start and end dates
  • User - filter by the user who performed the action

Click on any log entry to view its full JSON details in a dialog.

Action Types

Common action types include:

CategoryActions
AuthenticationUSER_LOGIN, USER_LOGOUT, USER_LOCKED, OIDC_LOGIN_SUCCESS
SystemsSYSTEM_CREATED, SYSTEM_UPDATED, SYSTEM_OFFBOARDED
CredentialsCREDENTIAL_CREATED, CREDENTIAL_UPDATED, CREDENTIAL_PAM_SCRIPT_UPLOADED
ScanningSCAN_EXECUTED, SCAN_COMPLETED
AccountsACCOUNT_LINKED, IDENTITY_CREATED
AdministrationLICENSE_ACTIVATED, CONFIG_CHANGED, API_KEY_CREATED

Scan Agents

Navigate to Administration > Scan Agents to manage remote scan agents.

See Scan Agent for full documentation on deploying and configuring agents.

The administration page lets you:

  • View registered agents and their status (online/offline, last heartbeat)
  • Create agent groups to organise agents by network segment
  • Assign systems to agent groups (systems in a group are scanned by agents in that group)
  • Regenerate agent API keys
  • Enable/disable agents
  • Drain agent queues (finish current jobs, accept no new ones)
  • Download agent installation packages (Docker image or JAR)

API Keys

Requires Enterprise edition.

Navigate to Administration > API Keys to manage API keys for programmatic access.

Creating an API Key

  1. Click Create Key
  2. Enter a name/description for the key
  3. Click Create
  4. Copy the key immediately - it is only displayed once
danger

The API key value is shown only at creation time. If you lose it, you must create a new key.

Managing API Keys

ActionDescription
EnableActivates a disabled key
DisableTemporarily disables a key (can be re-enabled)
DeletePermanently removes the key

All API key operations are recorded in the audit log.

System Settings

Navigate to Administration > Settings to configure application-wide settings.

SettingDefaultDescription
Date Formatyyyy-MM-ddHow dates are displayed in the UI
DateTime Formatyyyy-MM-dd HH:mm:ssHow timestamps are displayed
Connection Timeout60 secondsDefault timeout for testing system connections

Changes take effect immediately.

Authentication (OIDC/SSO)

Requires Enterprise edition.

Navigate to Administration > Authentication to configure OIDC single sign-on.

Configuration

FieldDescription
Issuer URLYour identity provider's OIDC issuer URL
Client IDOAuth 2.0 client ID
Client SecretOAuth 2.0 client secret (encrypted at rest)
Redirect URIThe callback URL (https://your-orbisid-host/oidc-callback)
Role ClaimJWT claim name containing the user's role

How It Works

Role Mapping

If a user has the role INHERIT_FROM_OIDC_CLAIM, their effective role is determined by the value of the configured role claim in the ID token. The claim value must match one of:

  • ADMINISTRATOR
  • IAM_GOVERNANCE_MANAGER
  • IAM_GOVERNANCE_ANALYST

Users with a specific OrbisID role assigned always use that role, regardless of the SSO claim.

Testing

After saving the configuration, click Test to verify the OIDC flow works. If the test succeeds, the SSO button will appear on the login page.

To remove OIDC, click Delete Configuration.

Licence Management

Navigate to Administration > Licence to view and manage your OrbisID licence.

Viewing Licence Status

The licence page shows:

FieldDescription
EditionCommunity, Pro, or Enterprise
StatusActive, Expired, or Community
Valid UntilExpiry date (if applicable)
Max SystemsMaximum number of active systems
Max UsersMaximum number of user accounts
Max SchedulesMaximum number of scheduled scan policies

Activating a Licence

  1. Paste your licence key into the text field
  2. Click Preview to verify the key details before activating
  3. Click Activate

Deactivating a Licence

Click Deactivate to revert to the Community edition. Your data is preserved, but features beyond Community limits will become locked.

Edition Comparison

See Licensing for a full comparison of features by edition.