Identity Details

The Identities Details page focuses on an individual identity and provides a comprehensive view of an identity's digital footprint, access rights, potential vulnerabilities, and overall security posture within an organization's IT ecosystem.

To access this page:
  • In the Identity Overview page, click See Details located at the end of the row containing the person's name in the table.

Header and Top Section

  • Identity Name: Displays the name of the identity.

  • Person Icon and Source: Shows the identity's association with specific sources. Hovering over the source icons will reveal the name of the Identity Provider.

  • Summary: A detailed summary about the identity and the weaknesses detected for this identity.

  • Asset Exposure Score: Quantifies the security exposure of the identity, with a maximum score of 1000 representing the highest level of exposure.

  • Asset Criticality Rating:Reflects the importance of the identity within the organization, rated on a scale of 1 to 10, where 10 represents the highest criticality.

  • Weaknesses Identified: Displays the number of identified security weaknesses or vulnerabilities for this specific identity.

  • Key Properties: Lists key information, including the owner, location, and the date of the last update for this identity.

Header Tabs

Below the header, specific tabs offer detailed information specific to its category. See the detailed descriptions for each tab in the section below.

  • Properties: Basic information and attributes of the identity.

  • Accounts: The identity's associated account and network profile.

  • Devices: Electronic devices associated with the identity.

  • Weaknesses: Specific security vulnerabilities or risks.

  • Entitlements: Specific permissions or access right granted to an identity within an organization's IT systems.

  • Roles: A collection of entitlements grouped together based on job functions, responsibilities, or organizational positions.

  • Groups: Organizational units or teams the identity belongs to.

  • Access: An overview of what resources or systems this identity can access.

  • Exposure Cards: Summaries of risk exposure levels.

  • Relationships: Connections to other identities or entities.

Where available, click "See details" to see more granular details in Tenable Inventory.