Compliance Commands
Keeper Commander compliance reporting commands
About
Compliance reports let account administrators adhere to regulations by providing on-demand visibility to access permissions on records and credentials across the enterprise.
Using Commander, compliance reports can be scheduled and automated, and results can be exported to a CSV file or JSON.
For more information about Compliance Reports, see the Compliance Reports documentation:
The compliance-report
command
compliance-report
commandThe compliance-report
command allows you to run reports just as you would in the Keeper Admin Console. See record permissions by node, user and title, filter by owned or shared records and output results to a file.
Cache
The compliance-report
command relies on a cache in order to improve performance across multiple report queries.
This means that the first call to compliance-report
may take several minutes as the system pulls in the required data.
During this time, Commander will display messaging explaining the current step.

Additionally, a manual rebuild of the cache can be performed with the -r
flag. Do this to see recent changes in the compliance data.
compliance-report -r
Conversely, if you would like to circumvent the automatic cache-refresh behavior described above and generate a report based solely on previously cached data (resulting in possibly stale results but nevertheless useful for avoiding the possibly long loading times required to refresh the cache), you can do so with the -nr
or --no-rebuild
flag. Do this to quickly perform queries on compliance data in cases where you can be fairly confident that the relevant data have not changed significantly since the last command call / cache refresh.
compliance-report -nr
Removing the Cache
The compliance report cache can be removed manually with the --no-cache
flag. When run, this completely removes all cached compliance report information from your machine.
compliance-report --no-cache
Alternatively, you can delete the cache file locally on disk from the location where you ran Commander. Delete the file called sox_<ID>.db
which contains the encrypted compliance data.
Filters
The compliance report can be filtered by Node, User, Job Title and if the record is shared, deleted, or active.
Outputting to a File
Like many Commander reports, the compliance report results can be saved to a file. To do this use the --output
and --format
options.
Output
--output [FILE PATH]
Tells Commander to write results to a file at the given location. If no file exists it will be created.
Format
--format [csv, json, table]
Tells Commander the format to write the report results as. The default result is in table format, which displays a formatted table of results. The other options are Comma Separated Values (CSV), JavaScript Object Notation (JSON).
The compliance
command
compliance
commandIn addition to enabling users in generating custom reports, Commander also provides users the ability to generate specific reports with the compliance
command. These specific reports can be generated by invoking the compliance
command's supported sub-commands.
The compliance
command supports the following sub commands:
Refer to the sub command's section for more information.
Compliance Team Report
Shared folders can be shared to Keeper Teams as well as individuals. The compliance report can display a report of the access that each team has to these shared folders.
To run the Compliance Team Report, use the following command in Commander:
compliance team-report
This report uses the compliance report cache described above.
The report shows each team that has access to a shared folder, and what access it has to that shared folder.
My Vault> compliance team-report
Team Name Team UID Shared Folder Name Shared Folder UID Permissions Records
----------- ---------------------- ------------------ ---------------------- ------------------- ---------
Engineering qLoY4YptKEs30VK_D8px1A Devops Secrets YZaagndh8CQToqlhuvv95Q Read Only 1
Marketing XWLBkyN_HnwJKA4BYWrByw Website Logins -IcFcSgrFPEW9aP1-noiWw Can Share, Can Edit 2
Compliance Record-Access Report
The compliance record-access report displays a list of all records that either a) have been accessed by, or b) are currently accessible to any given user(s), along with other relevant information (e.g., app used, IP address, event timestamp, etc.).
To run the Compliance Record-Access Report and show a user's record-access history, run the following command in Commander:
compliance record-access-report --email user1@company.com
where user1@company.com
is the user whose record-access activity we'd like to audit, with the resulting output being something like the following:
My Vault> compliance record-access-report --email user1@company.com
Vault Owner Record UID Record Title Record URL Has Attachments In Trash Record Owner IP Address Device Last Access
----------------- ---------------------- ------------ ------------- ----------------- ---------- ----------------- ------------- ----------------- -------------------
user1@company.com LDUw6M6jNcUmEkuArp4LXQ User1-Login domain.com False False user1@company.com 172.158.8.18 Web App 16.10.2 2023-05-30 17:04:23
5U4DK0MmJ5ZVui-o6JcDQw User2-Login google.com True False user2@company.com 172.158.8.18 Web App 16.10.2 2023-01-24 17:04:18
MMhu6YQ5gKtYbgPiVD41UQ User3-Login hotmail.com False False user3@company.com 172.158.8.18 Web App 16.10.2 2022-11-31 14:35:23
Similarly, to show a list of all records that are currently accessible by that same user (i.e., all records currently in the user's vault), run the following command:
compliance record-access-report --report-type=vault --email=user1@company.com
The output of the above command should look similar to the previous example, but will exclude records that are not currently in the user's vault and may include records that have never been accessed by that user.
Additionally, if you would like to run this report for multiple users, you may do so by 1) specifying each username / ID separately, 2) by using the "@all" shorthand to indicate that you would like to run the report for all users or 3) by not providing a user — yet a more concise way to include all users in the report. This is illustrated in the following corresponding examples:
compliance record-access-report -e user1@company.com -e user2@company.com
compliance record-access-report --email @all
compliance record-access-report
Compliance Summary Report
The compliance summary report displays aggregate information about records within the enterprise (grouped by record-owner by default for now, but support for grouping by other entities may be added to this feature later)
To run the Compliance Summary Report, run the following command in Commander:
compliance summary-report
or
compliance stats
with the resulting output being something like the following:
My Vault> compliance summary-report
Email Total Items Total Owned Active Owned Deleted Owned
------------------------------- ------------- ------------- -------------- ---------------
bob.loblaw@keeperdemo.io 22 14 12 2
jose.rizal@keeperdemo.io 49 42 33 9
tyrion.lannister@keeperdemo.io 3 3 3 0
doogie.howzer@keeperdemo.io 15 5 5 0
alan.turing@keeperdemo.io 17 13 4 9
richard.feynmann@keeperdemo.io 4 1 1 0
TOTAL 78 58 20
Compliance Shared-Folder Report
Similar to compliance team-report
, this command outputs a report detailing the access that all entities (teams as well as individual users) have to all shared folders within the enterprise.
To run the Compliance Shared-Folder Report, run the following command in Commander:
compliance shared-folder-report
or
compliance sfr
with the corresponding output:
My Vault> compliance sfr
Loading record information....
Loading compliance data....:
Shared Folder UID Team UID Team Name Record UID Email
---------------------- ---------------------- ------------ ---------------------- ------------------------------
y01GmuTipqHGLdd0NkM4qw PG7MELDIOaNMQkDiw--JoQ bob.loblaw@keeperdemo.io
1JDuc5ZcJDpt8SbhYnD0HA nate.hawthorne@keeperdemo.io
YZaagndh8CQToqlhuvv95Q qLoY4YptKEs30VK_D8px1A Engineering IOYb8jAmDsaIGtTwZB5Biw samuel.clemens@keeperdemo.io
w.b.yeats@keeperdemo.io
-IcFcSgrFPEW9aP1-noiWw XWLBkyN_HnwJKA4BYWrByw Marketing O69TWFDnPCG_dpg9wpABqg e.hemmingway@keeperdemo.io
qLoY4YptKEs30VK_D8px1A Engineering f46BWlqg5SoWraVlEFFSDA
0qpDTAWuznWrInnednG3Xw XWLBkyN_HnwJKA4BYWrByw Marketing EnqP808xakJA9hOpjhYb9A e.hemmingway@keeperdemo.io
See the Reporting Documentation for other reports available in Commander
Last updated
Was this helpful?