Third-Party Device-ID APIs
Use APIs to manage the IP address-to-device mappings of devices in your
network.
Where Can I Use This? | What Do I Need? |
- Prisma Access (Managed by Strata Cloud Manager)
- Prisma Access (Managed by Panorama)
|
- Prisma Access license
- Device Security license
|
After you have onboarded to the Third-Party Device-ID service using the Cloud
Identity Engine user interface, you can use these APIs to manage the verdicts, or
IP address-to-device mappings, detected in your network and stored in the Third-Party
Device-ID service. These mappings tell Prisma Access which attributes belong to a
device with a particular IP address so that you can define a Security policy that
targets devices with specific attributes.
These APIs don't directly access the data stored in your Cloud Identity Engine
tenant. Rather, the APIs interact with the IP address-to-device mappings in the
Third-Party Device-ID service, which shares those mappings with Cloud Identity
Engine.
The Third-Party Device-ID APIs use a certificate, an API key, and a base URL
for API requests. To authenticate Third-Party Device-ID API requests, you must use the
signed certificate and API token you obtained during onboarding in the Cloud Identity
Engine user interface.
When you have a certificate and an API key, you can make requests against the
Third-Party Device-ID service.
There are two methods to retrieve data using the API.
- Put the apiKey in the header. Palo Alto Networks recommends that you use this
method of retrieval for the API and new
The <production-endpoint>
variable depends on the location of the device being queried. For devices in the
EU, use
https://eu.device-identity-broker.services-edge.paloaltonetworks.com.
For devices in the United States, use
https://us.device-identity-broker.services-edge.paloaltonetworks.com.
Example:
curl --cert <cert-file> --key <key-file> 'https://<production-endpoint>/api/v1/token/verdicts?pageLen=1' -X GET -H "apiKey: <apiKey>"
- Put the apiKey in the path of the URI.
This legacy
method is being deprecated. Palo Alto Networks recommends putting the apiKey in
the header.
Example:
curl --cert <cert-file> --key <key-file>'https://<production-endpoint>/api/v1/token/<apiKey>/verdicts?pageLen=1' -X GET