PDF Report
Not everyone will have access to the IQ Server or any of the integrated enforcement points, and in turn, any of the associated reports. However, certain individuals or teams would likely still benefit from the information the Application Composition Report provides. Even if that’s not your particular situation, you may reach a point where you would like to produce an archive of an Application Composition Report for historical and audit purposes. Given this need, a PDF can be generated for every report you produce.
Creating the PDF
With the Application Composition Report open, find the Options drop-down in the top right. The first entry in this drop-down is titled Generate PDF. Simply click that entry and your browser will prompt you to download a PDF version of the report.
Note
The report filename uses the following pattern: applicationName-stageName-timestamp.pdf.
Reviewing the PDF
The information provided by the PDF is organized into a series of tables.
Policy Violations
The Policy Violations table lists all policy violations for all components. This matches the data displayed in the Policy Violations tab of the Component Details Page.
Waiver Status
The Policy Violations table in the PDF report includes a WAIVED column indicating whether each violation has been waived (Yes / No). This provides complete visibility into all evaluated components and policy decisions.
Security Vulnerabilities
The Vulnerabilities table lists all security vulnerabilities found for all components.
Licenses
The Licenses table lists all licenses found for all components. In this list, the declared license(s) will be shown in bold.
The Licenses table lists the Effective, Declared, and Observed licenses separately. The Effective license will be post-fixed with the text "(Overridden)" if it is due to an override.
Refer toComponent License Informationon how to interpret the license information in detail.
Component BOM
The Component BOM (Bill-Of-Materials) table lists all components.