Access keys
- 1 minute to read
- Print
- DarkLight
- PDF
Access keys
- 1 minute to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
This article contains detailed information about the Access keys home screen of MySafe.
Info
To learn how to use the MySafe APIs, access the MySafe APIs document.
Home screen icons
Item | Description |
---|---|
Show filters | Represented by the magnifying glass icon, it displays or hides the search fields on the screen. |
Update | Represented by the counterclockwise arrow icon, it refreshes the page. |
View actions | Represented by the three vertical dots icon, it displays a menu with possible actions for the report. |
New | Represented by the plus sign, it opens the page the New acess key to create a new authorization access key. |
Print report | Identified by the printer icon, it opens a new page for printing the report. |
Export CSVRepresented by the paper sheet icon, it downloads the report. | |
Schedule report | Represented by the clock icon, it opens the Schedule report screen. |
Search fields
Item | Description |
---|---|
Application | Access key name. |
Tags | Keywords to help identify the access key. |
Encrypted | Encryption option for the access key. The available options are Yes and No. If you clear the search field, it displays the All option. |
Expiration date/until | Time frame during which the access key expired. Enter the initial date in the Expiration date field and the final date in the until field. |
Creation date/until | Timeframe during which the access key was created. Enter the initial date in the Creation date field and the final date in the until field. |
Filter | Button that filters the results according to your chosen preferences. |
Clear | Button that clears the selected filters. |
Report field
- Application.
- Tags.
- Information.
- Authentication method.
- Encrypted.
- Expiration date.
- Creation date.
- Action: in this column, you'll find the following options:
- View: represented by the key icon, it opens the Application authorizationwindow with detailed information about the access key.
- Three vertical dots: a drop-down menu with the options: Change, Decrypt key, Clone, and Revoke.
Info
The report displays 30 lines per page. To move to the next screen, click the forward button at the end of the report.
Was this article helpful?