Track inventory with Custom Reports
Table of Contents
Expand all | Collapse all
-
- Activate Next-Generation Trust Security
-
-
- Configure AWS connection
- Configure Azure Key Vault connection
-
- Workload Identity Federation authentication
- Workload Identity Federation - Azure Identity Provider authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Workload Identity Federation authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Supported OIDC claims
-
-
-
-
- Create an F5 BIG-IP LTM machine
- Create a Microsoft Azure Private Key Vault machine
- Create a Microsoft IIS machine
- Create a Microsoft Windows (PowerShell) machine
- Create a Microsoft SQL Server machine
- Create a Common KeyStore machine
- Create a Citrix ADC machine
- Create an Imperva WAF machine
- Create a VMware NSX Advanced Load Balancer (AVI) machine
- Create an A10 Thunder ADC machine
- Create a Cloudflare machine
- Create Kemp Virtual LoadMaster machine
- Create a Palo Alto Panorama machine
-
- Provision to an F5 BIG-IP LTM
- Provision to a Microsoft Azure Private Key Vault
- Provision to Microsoft IIS
- Provision to Microsoft Windows (PowerShell)
- Provision to Microsoft SQL Server
- Provision to a Common KeyStore
- Provision to a Citrix ADC
- Provision to an Imperva WAF
- Provision to VMware NSX Advanced Load Balancer (AVI)
- Provision to an A10 Thunder ADC
- Provision to Cloudflare
- Provision to a Kemp Virtual LoadMaster
- Provision to Palo Alto Panorama
-
-
- 47-Day Validity Readiness TLS Certificates dashboard
- About the Certificate Inventory
- Managing certificate lifecycle settings
- Reissuing certificates in Next-Gen Trust Security
- Downloading certificates, certificate chains, and keystores
- Retiring, recovering, and deleting certificates
- Finding certificates in the certificate inventory
- Importing certificates from a CA using EJBCA
- Notification Center overview
- Domain-based validation for external emails
- Managing user accounts
- Troubleshooting
Track inventory with Custom Reports
The Custom Reports inventory in Next-Gen Trust Security shows categorized prebuilt and custom reports that help you analyze certificate activity. It helps you understand what data is available so you can monitor trends and identify potential issues.
Report inventory
Like other lists in Next-Gen Trust Security, the inventory displays all available custom reports. Use Filters to find specific reports. Click a report to view its details.
The inventory displays the first 25 reports. Use the pagination controls at the bottom of the inventory to view additional reports, or use the Rows per page option to display more results.
Hover over a column header to open the column action menu. Depending on the column, you can sort, pin, hide, or filter it. Use Manage Columns to control which columns are visible.
Individual report details
Click a report name to open its details in a slide-out drawer.
The drawer provides access to report metadata and configuration details. Available actions depend on the report type and your permissions.
The drawer includes tabs for Details and Configuration, which reflect how the report was defined.
Details and Configuration tabs
The Details tab shows the report name, description, and metadata such as creation date and last run status.
Use the Configuration tab to review report filters and column settings.
Permissions
Only administrators can access and use Custom Reports.