Onboarding Overview for Supported SaaS Apps
Table of Contents
Expand all | Collapse all
-
-
- What’s Data Security?
- Navigate To Data Security in Cloud Management Console
- Activate Data Security on the Hub
- Access Data Security for Standalone SaaS Security
-
- Allowed List of IP Addresses
-
- Begin Scanning an Amazon Web Services App
- Begin Scanning a Bitbucket Cloud App
- Begin Scanning a Box App
- Begin Scanning a Cisco Webex Teams App
- Begin Scanning a Citrix ShareFile App
- Begin Scanning a Confluence App
- Begin Scanning a Confluence Data Center App
- Begin Scanning a Dropbox App
- Begin Scanning a GitHub App
- Begin Scanning a GitHub V2 App
- Begin Scanning a Gmail App
- Begin Scanning a Google Cloud Storage App
- Begin Scanning a Google Drive App
- Begin Scanning a Jira Cloud App
- Begin Scanning a Jira Data Center App
- Begin Scanning a Microsoft Azure Storage App
- Begin Scanning a Microsoft Exchange App
- Begin Scanning Microsoft Office 365 Apps
- Begin Scanning a Microsoft Teams App
- Begin Scanning a Salesforce App
- Begin Scanning a ServiceNow App
- Begin Scanning a Slack for Enterprise Grid App
- Begin Scanning a Slack Enterprise App
- Begin Scanning a Slack for Pro and Business App
- Begin Scanning a Workday App (Beta)
- Begin Scanning a Yammer App
- Begin Scanning a Zendesk App
- Begin Scanning a Zoom App
- Reauthenticate to a Cloud App
- Verify Permissions on Cloud Apps
- Start Scanning a Cloud App
- Rescan a Managed Cloud App
- Delete Cloud Apps Managed by Data Security
- API Throttling
- Configure Classification Labels
- Microsoft Labeling for Office 365
-
-
-
- SaaS Security with Enterprise DLP
- Predefined Data Patterns on Data Security
- Proximity Keywords
- Confidence Levels
- Shared Data Profiles and Data Patterns
- Modify a Predefined Data Pattern
- Create a Custom Data Profile
- Add a File Property Data Pattern
- Create a Custom Data Pattern
- Use Exact Data Matching (EDM)
- Enable or Disable a Machine Learning Data Pattern
- Configure WildFire Analysis
- Configure Regular Expressions
- Enable or Disable a Data Pattern
- View and Filter Data Pattern Match Results
-
-
-
- What is an Incident?
- Assess New Incidents on Data Security
- View Asset Details
- Filter Incidents
- Security Controls Incident Details
- Track Down Threats with WildFire Report
- Track Down Threats with AutoFocus
- Customize the Incident Categories
- Close Incidents
- Download Assets for Incidents
- View Asset Snippets for Incidents
- Analyze Inherited Exposure
- Email Asset Owners
- Modify Incident Status
-
- What is a Data Violation?
- Assess New Data Violations on Data Security
- Configure Data Violation Alerts on Data Security
- Filter Data Violations on Data Security
- View Asset Snippets for Data Violations on Data Security
- View Data Violation Metrics on Data Security
- Modify Data Violation Status on Data Security
-
-
-
-
- What’s SaaS Security Inline?
- Navigate To SaaS Security Inline
- SaaS Visibility for NGFW
- SaaS Visibility and Controls for NGFW
- SaaS Visibility for Prisma Access
- SaaS Visibility and Controls for Panorama Managed Prisma Access
- SaaS Visibility and Controls for Cloud Managed Prisma Access
- Activate SaaS Security Inline for NGFW
- Activate SaaS Security Inline for VM-Series Firewalls with Software NGFW Credits
- Activate SaaS Security Inline for Prisma Access
- Connect SaaS Security Inline and Strata Logging Service
- Integrate with Azure Active Directory
-
-
- SaaS Policy Rule Recommendations
- App-ID Cloud Engine
- Guidelines for SaaS Policy Rule Recommendations
- Predefined SaaS Policy Rule Recommendations
- Apply Predefined SaaS Policy Rule Recommendations
- Create SaaS Policy Rule Recommendations
- Delete SaaS Policy Rule Recommendations
- Enable SaaS Policy Rule Recommendations
- Modify Active SaaS Policy Rule Recommendations
- Monitor SaaS Policy Rule Recommendations
-
- Enable Automatic Updates for SaaS Policy Rule Recommendations on Cloud Managed Prisma Access
- Import New SaaS Policy Rule Recommendations on Cloud Managed Prisma Access
- Update Imported SaaS Policy Rule Recommendations on Cloud Managed Prisma Access
- Remove Deleted SaaS Policy Rule Recommendations on Cloud Managed Prisma Access
- Manage Enforcement of Rule Recommendations on NGFW
- Manage Enforcement of Rule Recommendations on Panorama Managed Prisma Access
- Change Risk Score for Discovered SaaS Apps
-
-
-
-
- Onboarding Overview for Supported SaaS Apps
- Onboard an Aha.io App to SSPM
- Onboard an Alteryx Designer Cloud App to SSPM
- Onboard an Aptible App to SSPM
- Onboard an ArcGIS App to SSPM
- Onboard an Articulate Global App to SSPM
- Onboard an Atlassian App to SSPM
- Onboard a BambooHR App to SSPM
- Onboard a Basecamp App to SSPM
- Onboard a Bitbucket App to SSPM
- Onboard a BlueJeans App to SSPM
- Onboard a Box App to SSPM
- Onboard a Bright Security App to SSPM
- Onboard a Celonis App to SSPM
- Onboard a Cisco Meraki App to SSPM
- Onboard a ClickUp App to SSPM
- Onboard a Confluence App to SSPM
- Onboard a Contentful App to SSPM
- Onboard a Convo App to SSPM
- Onboard a Couchbase App to SSPM
- Onboard a Coveo App to SSPM
- Onboard a Crowdin Enterprise App to SSPM
- Onboard a Customer.io App to SSPM
- Onboard a Databricks App to SSPM
- Onboard a Datadog App to SSPM
- Onboard a DocHub App to SSPM
- Onboard a DocuSign App to SSPM
- Onboard a Dropbox Business App to SSPM
- Onboard an Envoy App to SSPM
- Onboard an Expiration Reminder App to SSPM
- Onboard a Gainsight PX App to SSPM
- Onboard a GitHub Enterprise App to SSPM
- Onboard a GitLab App to SSPM
- Onboard a Google Analytics App to SSPM
- Onboard a Google Workspace App to SSPM
- Onboard a GoTo Meeting App to SSPM
- Onboard a Grammarly App to SSPM
- Onboard a Harness App to SSPM
- Onboard a Hellonext App to SSPM
- Onboard an IDrive App to SSPM
- Onboard an Intercom App to SSPM
- Onboard a Jira App to SSPM
- Onboard a Kanbanize App to SSPM
- Onboard a Kanban Tool App to SSPM
- Onboard a Kustomer App to SSPM
- Onboard a Lokalise App to SSPM
- Onboard a Microsoft Azure AD App to SSPM
- Onboard a Microsoft Exchange App to SSPM
- Onboard a Microsoft OneDrive App to SSPM
- Onboard a Microsoft Outlook App to SSPM
- Onboard a Microsoft Power BI App to SSPM
- Onboard a Microsoft SharePoint App to SSPM
- Onboard a Microsoft Teams App to SSPM
- Onboard a Miro App to SSPM
- Onboard a monday.com App to SSPM
- Onboard a MongoDB Atlas App to SSPM
- Onboard a MuleSoft App to SSPM
- Onboard a Mural App to SSPM
- Onboard an Office 365 App to SSPM
- Onboard Office 365 Productivity Apps to SSPM
- Onboard an Okta App to SSPM
- Onboard a PagerDuty App to SSPM
- Onboard a RingCentral App to SSPM
- Onboard a Salesforce App to SSPM
- Onboard an SAP Ariba App to SSPM
- Onboard a ServiceNow App to SSPM
- Onboard a Slack Enterprise App to SSPM
- Onboard a Snowflake App to SSPM
- Onboard a SparkPost App to SSPM
- Onboard a Tableau Cloud App to SSPM
- Onboard a Webex App to SSPM
- Onboard a Workday App to SSPM
- Onboard a Wrike App to SSPM
- Onboard a YouTrack App to SSPM
- Onboard a Zendesk App to SSPM
- Onboard a Zoom App to SSPM
- Onboarding an App Using Azure AD Credentials
- Onboarding an App Using Okta Credentials
- Delete SaaS Apps Managed by SSPM
Onboarding Overview for Supported SaaS Apps
Before you onboard a SaaS app in SSPM, there are certain actions you must
take.
When you onboard a SaaS app to SSPM, you might be
prompted to provide configuration information that SSPM uses to connect to the SaaS app.
The required information varies from app to app. The following table describes the
actions you must take to onboard a particular SaaS app to SSPM. For some supported SaaS
Apps, more detailed onboarding instructions are available by following links that are
provided in the table.
SaaS App | Before Onboarding, Complete the Following Actions | During Onboarding, Complete the Following Actions |
---|---|---|
Aha.io See also Onboard an Aha.io App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. Multi-factor
authentication (MFA) using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, the MFA secret key, and the instance host
name. |
Alteryx Designer Cloud | Complete the following steps to enable SSPM to
connect to an Alteryx Designer Cloud API.
| When prompted, provide SSPM with your workspace
name and the access token. |
Aptible See also Onboard an Aptible App to SSPM. | Identify the Aptible user account whose login credentials
you will supply to SSPM. SSPM will use this account to access configuration information.
The user must be assigned to the Rooms Collaborator role, or a role
with greater permissions. | When prompted, provide SSPM with the login
credentials for the user account. |
ArcGIS See also Onboard an ArcGIS App to SSPM. | SSPM connects to an API and accesses configuration
information through OAuth 2.0 authorization. To enable OAuth 2.0
authorization:
|
|
Articulate Global See also Onboard an Articulate Global App to SSPM. | Identify the Articulate Global administrator account
whose login credentials you will supply to SSPM. SSPM will use this
account to access configuration information. The administrator must
be assigned to the Account Admin role. | When prompted, provide SSPM with the login
credentials for the user account. |
Atlassian See also Onboard an Atlassian App to SSPM. | By onboarding an Atlassian app, you enable SSPM to scan your Jira and
Confluence instances for connected third-party plugins. To enable
these scans, you must also onboard the Jira app or onboard the Confluence app.
From SSPM, you can then view the third party
plugins for Jira or Confluence and take action if necessary. Complete the following steps to enable SSPM to connect to an
Atlassian API.
| When prompted, provide SSPM with the login email address
of the Atlassian administrator who created the API token, the API token,
and the API key. |
BambooHR See also Onboard a BambooHR App to SSPM. | Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, the MFA secret key, and the company
domain. |
Basecamp See also Onboard a Basecamp App to SSPM. | SSPM connects to an API and accesses configuration information through OAuth 2.0
authorization. Identify the administrator account that you will use to
log in to Basecamp to grant SSPM access. To grant SSPM the access that
it requires, you must log in with an account that has Owner
permissions. | When SSPM redirects you to the Basecamp login
page, log in to the administrator account and grant SSPM the requested
access. |
Bitbucket See also Onboard a Bitbucket App to SSPM. | SSPM connects to an API and accesses configuration
information through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to Bitbucket to grant SSPM access. | When SSPM redirects you to the Bitbucket login
page, log in to the administrator account and grant SSPM the requested
access. |
BlueJeans See also Onboard a BlueJeans App to SSPM. | Complete the following steps to enable SSPM to connect to a BlueJeans
API.
| When prompted, provide SSPM with App Key and App Secret
for your enterprise app. |
Box See also Onboard a Box App to SSPM. | Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator credentials. If SSPM is
connecting to the account through Okta, provide SSPM with your
organization's Okta subdomain and the MFA secret key. |
Bright Security See also Onboard a Bright Security App to SSPM. | Identify the Bright Security account whose login
credentials you will supply to SSPM. The user must be assigned to the
Admin or Owner role. | When prompted, provide SSPM with the login credentials
for the administrator account. |
Celonis See also Onboard a Celonis App to SSPM. | Complete the following steps to enable SSPM to
connect to a Celonis API.
| When prompted, provide SSPM with your Celonis
team domain URL and the API key that you generated. |
Cisco Meraki See also Onboard a Cisco Meraki App to SSPM. | Complete the following steps to enable SSPM to
connect to a Cisco Meraki API.
| When prompted, provide SSPM with the API key
that you generated. |
ClickUp See also Onboard a ClickUp App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with your administrator credentials and, optionally,
the MFA secret key. |
Confluence See also Onboard a Confluence App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be
configured.
To enable SSPM to scan your Confluence instance for connected
third-party plugins, you must also onboard the Atlassian app.
| When prompted, provide SSPM with your organization's Okta subdomain, the
administrator credentials, and the MFA secret key. |
Contentful See also Onboard a Contentful App to SSPM. | Complete the following steps to enable SSPM to
connect to a Contentful API.
| When prompted, provide SSPM with the access
token. |
Convo See also Onboard a Convo App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be
configured.
| When prompted, provide SSPM with your organization's Okta subdomain, the
administrator credentials, and the MFA secret key. |
Couchbase See also Onboard a Couchbase App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with your Couchbase
tenant ID and the administrator login credentials. |
Coveo See also Onboard a Coveo App to SSPM. | Complete the following steps to enable SSPM to
connect to a Coveo API.
| When prompted, provide SSPM with your Coveo
organization ID and the API key. |
Crowdin Enterprise See also Onboard a Crowdin Enterprise App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's domain name, Okta domain,
the administrator credentials, and the MFA secret key. |
Customer.io See also Onboard a Customer.io App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's
Okta domain, the administrator credentials, and the MFA secret key. |
Databricks See also Onboard a Databricks App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta
domain, the administrator credentials, and the MFA secret key. |
Datadog See also Onboard a Datadog App to SSPM. | Complete the following steps to enable SSPM to
connect to a Datadog API.
| When prompted, provide SSPM with your Datadog
region, the API key, and the Application key. |
DocHub See also Onboard a DocHub App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's
Okta domain, the user credentials, and the MFA secret key. |
DocuSign See also Onboard a DocuSign App to SSPM | SSPM connects to an API and accesses configuration
information through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to DocuSign to grant SSPM access. | When SSPM redirects you to the DocuSign login
page, log in to the administrator account and grant SSPM the requested
access. |
Dropbox Business See also
Onboard a Dropbox Business App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta
domain, the administrator credentials, and the MFA secret key. |
Envoy See also Onboard an Envoy App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be
configured.
| When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, and the MFA secret key. |
Expiration Reminder | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta
domain, the administrator credentials, and the MFA secret key. |
Gainsight See also Onboard a Gainsight PX App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the administrator login credentials and
subscription ID. |
Github Enterprise See also
Onboard a GitHub Enterprise App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account.
| When prompted, provide SSPM with the administrator
credentials, MFA secret key, and the name of the organization that you
want SSPM to scan. |
Gitlab See also Onboard a GitLab App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with your the access token and your organization
domain URL. |
Google Analytics See also Onboard a Google Analytics App to SSPM. | SSPM connects to an API and accesses configuration
information through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to Google Analytics to grant SSPM access.
From the account settings, copy the administrator Account ID. | When prompted, provide SSPM with the administrator
Account ID. When SSPM redirects you to the Google Analytics login
page, log in by using the administrator account and grant SSPM the
requested access. |
Google Workspace See also
Onboard a Google Workspace App to SSPM. | Complete the following steps to enable SSPM to connect to
a Google Workspace API through OAuth 2.0 authorization.
| When prompted, specify the Google Workspace organization
to scan. When SSPM redirects you to the Google Workspace login page, log
in to the administrator account and grant SSPM the requested
access. |
GoTo Meeting See also Onboard a GoTo Meeting App to SSPM. | SSPM connects to an API and accesses configuration
information through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to GoTo Meeting to grant SSPM access. | When SSPM redirects you to the GoTo Meeting
login page, log in to the administrator account and grant SSPM the
requested access. |
Grammarly See also Onboard a Grammarly App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's
Okta domain, the administrator credentials, and the MFA secret key. |
Harness See also Onboard a Harness App to SSPM. | Complete the following steps to enable SSPM to
connect to a Harness API.
| When prompted, provide SSPM with your API key. |
Hellonext See also Onboard a Hellonext App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the administrator credentials and the
organization name. |
IDrive See also Onboard an IDrive App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's
Okta domain, the administrator credentials, and the MFA secret key. |
Informatica Address Doctor | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the tenant
ID and the administrator login credentials. |
Intercom See also Onboard an Intercom App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the administrator
login credentials and your region. |
Jira See also Onboard a Jira App to SSPM. | Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
To enable SSPM to scan your Jira instance
for connected third-party plugins, you must also onboard the Atlassian app. | When prompted, provide SSPM with your organization's Okta
domain, the administrator credentials, and the MFA secret key. |
Kanbanize See also Onboard a Kanbanize App to SSPM. | Complete the following steps to enable SSPM to
connect to a Kanbanize API.
| When prompted, provide SSPM with your organization's
Kanbanize host name and the API key. |
Kanban Tool See also Onboard a Kanban Tool App to SSPM. | Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, the MFA secret key, and the instance host
name. |
Kustomer See also Onboard a Kustomer App to SSPM. | Complete the following steps to enable SSPM to
connect to a Kustomer API.
| When prompted, provide SSPM with your organization's
region and the API key that you generated. |
Lokalise See also Onboard a Lokalise App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, the MFA secret key, and the team
domain. |
Microsoft Azure AD See also
Onboard a Microsoft Azure AD App to SSPM. | SSPM connects to an API and accesses configuration information
through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to Azure to grant SSPM access. To grant
SSPM the access that it requires, you must log in with an account
that has Microsoft Global Admin permissions. | When SSPM redirects you to the Microsoft login page, log
in to the Global Admin account and grant SSPM the requested
access. |
Microsoft Exchange See also
Onboard a Microsoft Exchange App to SSPM. | High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft Exchange app individually gives you greater
visibility into Microsoft Exchange settings. Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator
credentials. If SSPM is connecting to the account through an identity
provider, specify the information that SSPM needs for MFA. |
Microsoft OneDrive See also
Onboard a Microsoft OneDrive App to SSPM. | High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft OneDrive app individually gives you greater
visibility into Microsoft OneDrive settings. Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator
credentials. If SSPM is connecting to the account through an identity
provider, specify the information that SSPM needs for MFA. |
Microsoft Outlook See also
Onboard a Microsoft Outlook App to SSPM. | High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft Outlook app individually gives you greater
visibility into Microsoft Outlook settings. Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator
credentials. If SSPM is connecting to the account through an identity
provider, specify the information that SSPM needs for MFA. |
Microsoft SharePoint | High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft SharePoint app individually gives you greater
visibility into Microsoft SharePoint settings. Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator
credentials. If SSPM is connecting to the account through an identity
provider, specify the information that SSPM needs for MFA. |
Microsoft Teams See also Onboard a Microsoft Teams App to SSPM. | High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft Teams app individually gives you greater
visibility into Microsoft Teams settings. Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator
credentials. If SSPM is connecting to the account through an identity
provider, specify the information that SSPM needs for MFA. |
Miro See also Onboard a Miro App to SSPM. | Complete the following steps to enable SSPM to
connect to a Miro API. SSPM connects to an API and accesses configuration information
through OAuth 2.0 authorization.
|
|
monday.com See also Onboard a monday.com App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with your administrator credentials and your account
domain. If the administrator account is configured for MFA, provide SSPM
with the MFA secret key. |
MongoDB Atlas See also Onboard a MongoDB Atlas App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, and the MFA secret key. |
MuleSoft See also Onboard a MuleSoft App to SSPM. | Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
| When prompted, provide SSPM with your organization's Okta
domain, the administrator credentials, the MFA secret key, and the
organization domain name. |
Mural See also Onboard a Mural App to SSPM. | SSPM connects to an API and accesses configuration
information through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to Mural to grant SSPM access. You must
log in as a workspace admin. | When SSPM redirects you to the Mural login
page, log in to the workspace admin account and grant SSPM the requested
access. |
Nintex Workflow Cloud | Complete the following steps to enable SSPM to
connect to a Nintex Workflow Cloud API.
| When prompted, provide SSPM with the Client
ID and the Client Secret that is associated with your app. |
Office 365 See also Onboard an Office 365 App to SSPM. | Connecting to Office 365 enables SSPM to
scan settings at a high level based on Microsoft's Secure Score. For
greater visibility into a particular application in the Office 365
product family, onboard the individual product app. By adding an
individual product app, you enable SSPM to scan more settings for
the particular product. To scan more settings for Microsoft Word,
Microsoft PowerPoint, and Microsoft Excel, onboard Office 365 -
Productivity Apps . Other products in the Office 365 product
family have their own tiles on the Applications page and can be
onboarded separately.SSPM connects to an API and accesses configuration information
through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to Office 365 to grant SSPM access. The
administrator must be assigned to the all of the following
roles:
| When SSPM redirects you to the Office 365 login
page, log in to the administrator account and grant SSPM the requested
access. |
Office 365 - Productivity Apps | High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Office 365 - Productivity Apps gives you greater
visibility into Microsoft Word, Microsoft PowerPoint, and Microsoft
Excel settings. Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator
credentials. If SSPM is connecting to the account through an identity
provider, specify the information that SSPM needs for MFA. |
Okta See also Onboard an Okta App to SSPM. | Complete the following steps to enable SSPM to
connect to an Okta API.
| When prompted, provide SSPM with your Admin instance URL and the API
token. |
PagerDuty See also Onboard a PagerDuty App to SSPM. | Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the following information:
If SSPM is connecting to the account through an identity provider,
specify the information that SSPM needs for MFA. |
Ping Identity | Complete the following steps to enable SSPM to
connect to a Ping Identity API.
| When prompted, provide SSPM with the following
information:
|
Pipedrive | Enable SSPM to connect to a Pipedrive API. Log
in to Pipedrive as an administrator and copy the administrator's
personal API token. | When prompted, provide SSPM with the API token. |
Pivotal Tracker | Complete the following steps to enable SSPM to
connect to a Pivotal Tracker API.
| When prompted, provide SSPM with the API token. |
Power BI See also Onboard a Microsoft Power BI App to SSPM. | Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
| When prompted, provide SSPM with your organization's Okta
domain, the administrator credentials, and the MFA secret key. |
Qualtrics XM | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with the following
information:
|
Redis Labs | Complete the following steps to enable SSPM to
connect to a Redis Labs API.
| When prompted, provide SSPM with the API Account
key and the API User key. |
RingCentral See also Onboard a RingCentral App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's
Okta domain, the administrator credentials, and the MFA secret key. |
Salesforce See also Onboard a Salesforce App to SSPM. | Complete the following steps to enable SSPM to connect to a Salesforce API
through OAuth 2.0 authorization.
|
|
SAP Ariba See also Onboard an SAP Ariba App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account.
| When prompted, provide SSPM with the administrator
credentials and your realm name. If SSPM will connect to the account by
using direct login, select the FQDN for your SAP Ariba instance. If SSPM
will connect to the account through Microsoft Azure, specify the
information that SSPM needs for MFA. |
Segment | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the user credentials.
If MFA is configured for the user, provide the MFA secret key. If
MFA is not configured for the user, leave the MFA Secret Key field
empty. |
Sentry | Complete the following steps to enable SSPM to
connect to a Sentry API.
| When prompted, provide SSPM with the authentication
token. |
ServiceNow See also Onboard a ServiceNow App to SSPM. | Complete the following steps to enable SSPM to connect to a
ServiceNow API through OAuth 2.0 authorization.
|
|
ShareFile | Complete the following steps to enable SSPM to
connect to a ShareFile API.
| When prompted, provide SSPM with the Client
ID and Client Secret. |
Slack Enterprise See also Onboard a Slack Enterprise App to SSPM. | Complete the following steps to enable SSPM to connect to a Slack Enterprise
API.
| When prompted, provide SSPM with the User OAuth Token that you generated. |
Snowflake See also Onboard a Snowflake App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account.
| When prompted, provide SSPM with the login credentials
for the user account and your Snowflake account name. |
SparkPost See also Onboard a SparkPost App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, and the MFA secret key. |
Splunk Cloud | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, the MFA secret key, and the Splunk app
domain. |
Sumo Logic | Complete the following steps to enable SSPM to
connect to a Sumo Logic API.
| When prompted, provide SSPM with the access
ID and access key. |
Syncplicity | SSPM connects to an API and accesses configuration
information through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to Syncplicity to grant SSPM access. | When SSPM redirects you to the Syncplicity
login page, log in to the administrator account and grant SSPM the
requested access. |
Tableau See also Onboard a Tableau Cloud App to SSPM. | Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator credentials and
the app subdomain. If SSPM is connecting to the account through an
identity provider, specify the information that SSPM needs for
MFA. |
Terraform | Complete the following steps to enable SSPM to
connect to a Terraform API.
| When prompted, provide SSPM with the API token. |
TextExpander | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's
Okta domain, the administrator credentials, and the MFA secret key. |
Tresorit | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be
configured.
| When prompted, provide SSPM with your organization's
Okta domain, the administrator credentials, and the MFA secret key. |
VMWare | Complete the following steps to enable SSPM to
connect to a VMWare API.
| When prompted, provide SSPM with the API token
and your organization ID. If you configured MFA for tokens, also
provide your MFA secret key. |
Webex See also Onboard a Webex App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta
domain, the administrator credentials, the MFA secret key, and your
organization ID. |
Workday See also Onboard a Workday App to SSPM. | SSPM connects to an API and accesses configuration information through OAuth 2.0
authorization and a custom report. Complete the following steps as a
Security Administrator.
| When prompted, provide SSPM with the following information:
|
Wrike See also Onboard a Wrike App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account.
|
|
YouTrack See also Onboard a YouTrack App to SSPM. | Complete the following steps to enable SSPM to
connect to a YouTrack API.
| When prompted, provide SSPM with the YouTrack
instance name and the permanent token. |
Zendesk See also Onboard a Zendesk App to SSPM. | Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator
credentials and your Zendesk subdomain. If you configured MFA for
Zendesk, or if SSPM is connecting to the account through an identity
provider, specify the information that SSPM needs for MFA. |
Zoho One | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's
Okta domain, the administrator credentials, the MFA secret key,
and your region. |
Zoho WorkDrive | Complete the following steps to enable SSPM to
access configuration information through OAuth 2.0 authorization.
|
|
Zoom See also Onboard a Zoom App to SSPM. | SSPM connects to an API and accesses configuration
information through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to Zoom. The account must have the following permissions:
| When SSPM redirects you to the Zoom login page,
log in to the administrator account and grant SSPM the requested
access. |