Owner Details
The Owner Details page provides a comprehensive, aggregated view of an individual identity with all associated accounts discovered by Hydden. This page consolidates security posture, authentication methods, group memberships, and activity across multiple accounts to provide an identity-centric risk assessment essential for compliance reporting, employee offboarding, and identity consolidation review.
Overview
Owner Details pages aggregate data from all accounts mapped to a single identity, providing a unified view of:
- Identity Attributes: Name, email, employee information, organizational details
- Aggregated Risk: Total threat score from all mapped accounts
- Authentication Posture: MFA coverage, failed logins, authentication patterns across accounts
- Access Overview: Consolidated group memberships, role assignments from all accounts
- Activity Timeline: Complete login history across all platforms and accounts
- Account Inventory: High-risk accounts, accounts without MFA, privileged accounts
This identity-level view enables security teams to assess overall risk for individuals rather than isolated accounts, making it ideal for executive risk reporting, access reviews, and offboarding verification.
Key Concepts
Owner Identity
An Owner represents an individual person or entity (human identity) to which multiple accounts are mapped. Owners are created through owner creation rules and linked to accounts via account mapping rules.
Owner Characteristics:
- One owner can have many accounts across different platforms
- Owner attributes typically come from HR systems or authoritative identity sources
- Aggregated threat scores consolidate risk from all mapped accounts
- Activity tracking spans all accounts associated with the owner
Account Mapping
Accounts are mapped to owners through various matching strategies:
- Email Matching: Primary email or User Principal Name (UPN)
- Attribute Matching: Employee ID, SAMAccountName, custom attributes
- Manual Mapping: Explicit mapping via Map To functionality
- Identity Mapping Rules: Custom rules based on organizational logic
For more details, see Account Mapping Rules.
Aggregated Risk Scoring
The owner's Total Threat Score aggregates risk from all mapped accounts:
- Each account's threat score is calculated from applicable threat rules
- Owner threat score is the sum of all mapped account threat scores
- Higher aggregated scores indicate identities with elevated risk across multiple accounts
- Risk indicators highlight specific concerns (high-risk accounts, missing MFA, etc.)
Employee Lifecycle
Owner records often contain employee lifecycle information:
- Hire Date: When the individual joined the organization
- Termination Date: When the individual left the organization
- Status: Active vs. terminated employees
- Organizational Details: Department, title, manager, location
This information is crucial for offboarding verification and access cleanup.
Data Tiles
The Owner Details page displays information tiles organized by functional area:
Owner Information Tile
| Field | Description |
|---|---|
| Owner Name | The name under which the owner identity was established |
| Primary Email | Primary email address for the owner |
| Alternate Email | Secondary or personal email addresses (if available) |
| Type | Owner type (typically "Employee", "Contractor", "External") |
| Status | Owner status (Active, Terminated, Suspended) |
| Phone | Business phone number (if available) |
| Mobile | Mobile phone number (if available) |
Employee Information Tile
| Field | Description |
|---|---|
| Job Title | Current job title or role |
| Department | Organizational department |
| Manager | Direct manager name |
| Employee ID | Unique employee identifier |
| Hire Date | Date the employee joined the organization |
| Termination Date | Date the employee left the organization (if applicable) |
| Location | Office location or work site |
Threat Score Tile
| Field | Description |
|---|---|
| Total Threat Score | Aggregated risk score from all mapped accounts |
| Risk Level | Visual indicator (Critical, High, Moderate, Low) |
| High Risk Account Count | Number of accounts with elevated threat scores |
Recent Failed Logins Tile
Displays recent failed authentication attempts across all mapped accounts:
- Platform: System where failed login occurred
- Account Name: Specific account with failed login
- Failed Login Count: Number of consecutive failures
- Last Failed Time: Timestamp of most recent failure
This tile helps identify potential brute force attacks or compromised credentials.
Number of Accounts without MFA Tile
| Field | Description |
|---|---|
| Accounts without MFA | Count of mapped accounts lacking multi-factor authentication |
| Total Accounts | Total number of mapped accounts |
| MFA Coverage % | Percentage of accounts with MFA enabled |
High Risk Accounts Tile
Lists the top five highest-risk accounts associated with this owner:
- Account Name: Account identifier
- Platform: System platform
- Threat Score: Individual account threat score
- Primary Risk Factors: Top security concerns (e.g., "Password 180+ Days", "MFA Not Enabled")
Click any account to navigate to Account Details.
Data Tabs
Owner Accounts Tab
Complete inventory of all accounts mapped to this owner identity.
Default Columns:
- Account Name
- Platform
- Data Source
- Account Type (User, Service, Federated, etc.)
- Status (Enabled, Disabled, Locked, Expired)
- Total Threat Score
- MFA Status
- Last Logon
- Classification
Use Cases:
- Account consolidation and deduplication
- Privileged account identification
- MFA coverage verification
- Orphaned account detection
- Access review preparation
- Offboarding verification (ensure all accounts disabled)
Actions:
- Click any account row to open Account Details
- Filter accounts by platform, type, status, or risk level
- Export account list for reporting
- Use Action button to initiate workflows for multiple accounts
Group Membership Tab
Aggregated view of all group memberships from all mapped accounts, showing the complete set of access permissions.
Default Columns:
- Group Name
- Group Platform
- Data Source
- Account Name (which mapped account has this membership)
- Membership Type (Direct / Expanded)
- Is Privileged
- Group Type
Use Cases:
- Comprehensive privilege review across all accounts
- Access certification and attestation
- Identify privileged group memberships
- Nested group membership analysis
- Compliance auditing (privilege segregation)
- Detect excessive access across multiple accounts
Filters:
- Filter by privileged groups only
- Filter by specific platforms
- Filter by direct vs. expanded membership
Login History Tab
Complete authentication timeline across all mapped accounts, providing a unified activity view.
Default Columns:
- Login Date/Time
- Account Name
- Platform
- Login Status (Success / Failed)
- Source IP Address (if available)
- Login Type (Interactive, Network, Service, etc.)
- Geolocation (if available)
Use Cases:
- Investigate suspicious authentication patterns across accounts
- Verify identity activity for access reviews
- Identify dormant accounts (no recent logins)
- Security incident investigation (compromised credentials)
- Unusual login time or location detection
- Compliance audit trails
- Offboarding verification (no logins after termination date)
Analysis Tips:
- Sort by Login Date/Time to see most recent activity
- Filter by Failed logins to identify potential security issues
- Filter by specific platforms to focus investigation
- Look for login activity after termination date (red flag)
MFA Devices Tab
Inventory of all multi-factor authentication devices and methods across all mapped accounts.
Default Columns:
- OIDC Provider (Okta, Azure MFA, Duo, Google Authenticator, etc.)
- MFA Type (SMS, Authenticator App, Hardware Token, Biometric, etc.)
- MFA Provider
- MFA Create Date
- MFA Status (Active, Inactive, Pending)
- Account Name (which account has this MFA device)
- Platform
Use Cases:
- MFA coverage analysis across all accounts
- Authentication method inventory
- Identify accounts without MFA for remediation
- Device management and cleanup
- Compliance verification (MFA requirements)
- Security posture assessment
Insights:
- Zero MFA devices: High priority for MFA enrollment
- Weak MFA methods: SMS-only MFA is less secure than app-based
- Inactive devices: May indicate device replacement needed
- Pending registrations: Follow up on incomplete MFA setup
SSH (Public) Keys Tab
Overview of all authorized SSH public keys across mapped accounts.
Default Columns:
| Column | Description |
|---|---|
| Source Account | Account that owns the public key (e.g., root, operator) |
| Source SSH Host | System where the public key was collected |
| Source Platform | Platform/OS (Linux, Unix) |
| Source Account Type | Account type (User, Service, etc.) |
| Algorithm | Encryption algorithm (RSA, ED25519, ECDSA, DSA) |
| Fingerprint | Unique key fingerprint |
| Restriction | IP address or subnet restrictions (if configured) |
| Usage | Key usage (Authentication) |
Use Cases:
- SSH access audits across all accounts
- Authorized key inventory
- Key rotation planning
- Access review for SSH-based access
- Compliance (key management policies)
- Identify weak algorithms (DSA, RSA <2048 bits)
Role Membership Tab
Aggregated view of all role assignments across all mapped accounts, showing the complete set of role-based access permissions.
Default Columns:
- Role Name
- Display Name
- Account Name (which mapped account has this role)
- Data Source
- Platform
- Role Type
Use Cases:
- Comprehensive role-based access review across all accounts
- Role certification and attestation
- Identify excessive or conflicting role grants across platforms
- Compliance auditing for separation of duties
- Compare role assignments across an identity's accounts
Click a role name to navigate to Role Details for the selected role.
SSH (Private) Keys Tab
Overview of all private SSH keys discovered on systems for mapped accounts.
Default Columns:
| Column | Description |
|---|---|
| Target Account | Account with the private key |
| Target SSH Host | System where the private key is stored |
| Target Platform | Platform/OS |
| Target Account Type | Account type |
| Algorithm | Encryption algorithm |
| Fingerprint | Unique key fingerprint |
Use Cases:
- Private key discovery and inventory
- Security risk assessment (exposed private keys)
- Key rotation and lifecycle management
- Compliance (private key storage policies)
- Identify shared or insecure key storage
Security Note: Private keys should be protected and not widely accessible. Discovery of private keys in unexpected locations may indicate security risks.
Share via Action
On tenants with the Integrate Action Providers and Workflows feature enabled, the Action button provides workflow automation options.
Available Actions
Email Notification:
- Send owner details to HR or management
- Alert security team about high-risk identities
- Request access review from manager
- Escalate security findings
- Termination/offboarding notifications
Create Ticket:
- Generate ServiceNow incident/request tickets for risk remediation
- Create JIRA issues for access cleanup
- Automated ticketing for policy violations
- Track remediation workflows
- Offboarding task creation
Custom Workflows:
- Execute organization-specific automation
- Trigger integration with HR systems
- Initiate provisioning/deprovisioning workflows
- Custom compliance reporting
- Automated escalation to management
Common Workflows
Executive Risk Reporting
- Access Owner Details for executives or high-value targets
- Review Total Threat Score and risk indicators
- Check High Risk Accounts Tile for specific concerns
- Examine Accounts without MFA to identify exposure
- Review Group Membership Tab for privileged access
- Check Login History for unusual activity or anomalies
- Use Action button to generate executive risk reports
- Export data for board-level reporting or compliance
Employee Offboarding Verification
- Search for Owner by name or email
- Verify Termination Date in Employee Information Tile
- Review Owner Accounts Tab to see all accounts
- Check Status column - all accounts should be Disabled
- Review Login History Tab to ensure no logins after termination date
- Check Group Membership Tab to verify access removal
- Review SSH Keys Tabs to identify keys requiring revocation
- Use Action button to create ticket if cleanup needed
- Document completion for compliance audit trail
Identity Consolidation Review
- Access Owner Details for identity requiring review
- Review Owner Accounts Tab for all mapped accounts
- Identify duplicate or unnecessary accounts (multiple accounts on same platform)
- Check Last Logon for each account to identify dormant accounts
- Review Group Memberships for access consolidation opportunities
- Assess MFA coverage across accounts
- Plan consolidation strategy (which accounts to disable/merge)
- Use workflows to request account cleanup
- Track progress through multiple reviews
Compliance Audit (Identity-Level)
- Filter owners by department or role
- Review MFA coverage via Accounts without MFA Tile
- Check aggregated threat scores for policy violations
- Review privileged access via Group Membership Tab
- Verify separation of duties across accounts
- Check authentication compliance via Login History
- Review SSH key compliance via SSH Keys Tabs
- Verify employee lifecycle data (hire/termination dates)
- Export evidence for compliance reporting
- Generate reports for auditors
Understanding Owner Identity
The Owner entity represents the identity-centric view in Hydden, consolidating all accounts belonging to a single individual. This approach enables:
Identity-Based Risk Assessment
Traditional account-based security tools assess risk per account. Hydden's owner-level view reveals:
- Cumulative Risk: An individual may have low-risk accounts individually, but high cumulative risk
- Cross-Account Patterns: Suspicious activity patterns across multiple accounts
- Privilege Consolidation: Total privilege level when all accounts are considered together
- MFA Coverage Gaps: Identifies which accounts lack MFA for a specific individual
Account Mapping Status
The Mapped To field on Account Details links back to the owner identity. Mapping scenarios include:
- Mapped to Owner: Account successfully linked to an identity (normal state)
- No Owner: Account not mapped to any identity (orphaned account - security risk)
- Shared Account: Account mapped to multiple owners (potential policy violation)
- Shared Account+: Account mapped to 3+ owners (high-risk sharing)
For details on account mapping, see Account Mapping Rules and Map To documentation.
Owner Creation
Owners are created through Owner Creation Rules which define:
- Authoritative Source: Which data source provides owner identity data (typically HR system, Active Directory, or cloud identity provider)
- Matching Attributes: Which fields uniquely identify owners (email, employee ID, etc.)
- Attribute Priority: Which source takes precedence when conflicts exist
- Update Logic: How owner attributes are updated when new data arrives
Troubleshooting
| Issue | Solution |
|---|---|
| Owner has no mapped accounts | Verify account mapping rules are configured; check email/UPN matching |
| Incorrect owner attributes | Review owner creation rules; verify authoritative source priority |
| Aggregated threat score too high | Review individual account threat scores; investigate high-risk accounts; verify threat rule thresholds |
| Missing employee information | Verify HR system data source is collecting and providing employee attributes; check collector permissions |
| Login history incomplete | Ensure authentication logging is enabled on platforms; verify collector configuration for login data |
| No MFA device data | Verify data sources support MFA collection; check collector permissions for MFA APIs |
| Accounts not showing in Owner Accounts Tab | Verify account mapping; check if accounts have valid email/UPN; manually map accounts via Map To |
| Terminated employee showing as active | Verify termination date is being collected from authoritative source; check owner creation rule logic |
Related Topics
- Entity Details Overview - Overview of all entity detail pages
- Account Details - Individual account-level view
- Group Details - Group membership details
- Global Search - Search interface
- Global Search Default Columns - Column reference
- Owner Creation Rules - Configure owner identity creation
- Account Mapping Rules - Configure account-to-owner mapping
- Identity Mapping Rules - Configure identity mapping logic
- Threat Detection - Understanding threat rules and scoring
- Map To - Manual entity mapping
- Automation Workflows - Action workflows and triggers
