Skip to main content

Statistics Dashboard

The Statistics Dashboard provides a comprehensive inventory of all resources managed by ThetaSecure. It gives you an at-a-glance view of your identity infrastructure without needing to navigate into individual modules.

Navigation: Dashboard \u2192 Statistics tab

Statistics Dashboard

Dashboard Sections

Identity Management

A summary of your organization's identity infrastructure:

CardDescriptionExample
Total UsersTotal number of user accounts in the system63 (Active: 63, Inactive: 0)
GroupsNumber of user groups configured5
RolesNumber of roles defined8
PermissionsTotal number of permission rules173

Each card is clickable and navigates to the corresponding management page for detailed configuration.

Applications

Shows the count of registered applications by type:

CardDescriptionExample
Web AppsBrowser-based applications integrated with ThetaSecure SSO0 (Active: 0)
Network AppsNetwork-level applications (e.g., VPN, RADIUS-protected resources)3 (Active: 0)

Access & Security

Displays the current state of access control configurations:

CardDescriptionExample
Network PoliciesNumber of network access policies defined2 (Active: 2)
DevicesRegistered devices and pending approvals0 (No pending approvals)
RADIUS ClientsNetwork equipment configured as RADIUS clients0 (Active: 0)

Authentication

Overview of authentication policy configurations:

CardDescriptionExample
Sign-in PoliciesRules governing how users authenticate2 (Active: 0)
MFA PoliciesMulti-factor authentication enforcement rules1 (Active: 0)

Directory Sync

Status of directory synchronization connections:

Statistics - Directory Sync

CardDescriptionExample
Sync ProfilesConfigured directory sync profiles1 (Active: 1)
ConnectorsDirectory connectors (AD, LDAP, Cloud)1 (Active: 0)

The page footer shows the Last updated timestamp (e.g., 08/02/2026, 14:27:30) and a Refresh button.

Using the Statistics Dashboard

The Statistics Dashboard is ideal for:

  • Onboarding audits: Verify that all expected users, groups, and roles have been provisioned
  • Configuration reviews: Confirm the right number of policies and applications are in place
  • Compliance checks: Document the current state of your IAM configuration for auditors
  • Quick health checks: Spot missing configurations (e.g., 0 active MFA policies may indicate MFA is not enforced)
tip

If you see \