Skip to main content

PDF Report

Not everyone will have access to the IQ Server or any of the integrated enforcement points, and in turn, any of the associated reports. However, certain individuals or teams would likely still benefit from the information the Application Composition Report provides. Even if that’s not your particular situation, you may reach a point where you would like to produce an archive of an Application Composition Report for historical and audit purposes. Given this need, a PDF can be generated for every report you produce.

Creating the PDF

With the Application Composition Report open, find the Options drop-down in the top right. The first entry in this drop-down is titled Generate PDF. Simply click that entry and your browser will prompt you to download a PDF version of the report.


The report filename uses the following pattern: applicationName-stageName-timestamp.pdf.

Reviewing the PDF

The information provided by the PDF is organized into a series of tables.

Policy Violations

The Policy Violations table lists all policy violations for all components. This matches the data displayed in the Policy Violations tab of the Component Details Page.

Security Vulnerabilities

The Vulnerabilities table lists all security vulnerabilities found for all components.


The Licenses table lists all licenses found for all components. In this list, the declared license(s) will be shown in bold , and any observed licenses will be shown in non-bold text up until IQ Server version 129.

The Licenses table lists the Effective, Declared, and Observed licenses separately. The Effective license will be post-fixed with the text "(Overridden)" if it is due to an override.

Refer toComponent License Informationon how to interpret the license information in detail.

Component BOM

The Component BOM (Bill-Of-Materials) table lists all components.