As an Organization Owner user in an Identity Governance and Administration (IGA) activated Organization, you monitor access violations for user logins and logins with OAuth apps and API tokens in your Organization. You define and modify the policies for triggering violations.
You set up violation policies for logins in your IGA-activated Organization by activating various triggers for OAuth apps and API tokens, such as inactive API tokens, inactive OAuth owners, broad service scopes, insecure or unapproved URIs for OAuth apps.
NoteIf Source Domain authentication policy is activated, User Access violations are captured for all login attempts originating from domains that are not allowed by the policy setting.
Log in to the Tanzu Platform cloud services console with your corporate account.
Navigate to Identity and Access Management > Governance > Violations.
Click Settings.
In the Violation Settings page that opens, modify the settings for OAuth Apps and API tokens as appropriate.
Click Save.
The Violations dashboard is refreshed to display violations according to the new settings.
The information on the dashboards is updated daily.
Parent topic:What is Identity Governance and Administration and how does it work with Tanzu Platform cloud services