Reports help to troubleshoot and debug user's issues. You can monitor who accessed what application, or when it was accessed, view the SSH sessions with all keystrokes, check EAA Client applications errors, client details, gather data like top applications, users, failed login, and get audit logs on configuration and system changes.
Generate reports to view application access and admin events log data during a specified time period. For Enterprise Application Access (EAA) there are several types of reports available in the Application Access > Reports:

  • Application Access. Create this report to see the log and event data for an application. Select specific data that you want to check for your application (for example, application name and URL, username, OS and browser of the user who accessed or attempted access to the application, or login events and general errors that occurred).

  • SSH Audit. Logs all keystrokes and SSH commands executed for a SSH application.

  • Client Reports. Predefined reports that show the log and event data for all client events (for example you can check the client version, OS, error codes and their count, or clients that are vulnerable and are likely to cause security issues if used to access EAA application).

  • Access Reports. Predefined reports that show the log and event data for all applications events like the count of active sessions and session time, number of login failures, user name and event details, top used applications or blocked access count.

  • System Reports. Predefined reports for EAA administrators' status changes for EAA resources. Each of the reports show date, admin, resource type, resource, event type and event for applications, connectors, directories or certificates.

  • Admin Reports. Shows EAA administrators' login, configuration, and system events triggered by them.

You can grant a user a report administrator role that has permissions to run, save and download reports. This role also has read access to connectors, directories, identity providers, and applications. You can also create a custom administrator role to manage the administration tasks for multiple resources using role-based access control in ‚ÄčAkamai Control Center‚Äč.



The retention period for all data is 12 months. Customer reports are available for 90 days. If you need older data, please contact Akamai Support.