Onboarding Overview for Supported SaaS Apps
Table of Contents
Expand all | Collapse all
-
-
- Allowed List of IP Addresses
-
- Begin Scanning a Bitbucket App
- Begin Scanning a Box App
- Begin Scanning ChatGPT Enterprise App
- Begin Scanning a Cisco Webex Teams App
- Begin Scanning a Confluence App
- Begin Scanning a Confluence Data Center App
- Begin Scanning a Dropbox App
- Begin Scanning a GitHub App
- Begin Scanning a Gmail App
- Begin Scanning a Google Drive App
- Begin Scanning a Jira App
- Begin Scanning a Jira Data Center App
- Begin Scanning a Microsoft Exchange App
- Begin Scanning Office 365 Apps
- Begin Scanning a Microsoft Teams App
- Begin Scanning a Salesforce App
- Begin Scanning a ServiceNow App
- Begin Scanning a ShareFile App
- Begin Scanning a Slack Enterprise App
- Begin Scanning a Slack for Pro and Business App
- Begin Scanning a Workday App (Beta)
- Begin Scanning a Zendesk App
- Begin Scanning a Zoom App
- Reauthenticate to a Cloud App
- Verify Permissions on Cloud Apps
- Start Scanning a Cloud App
- Rescan a Managed Cloud App
- Delete Cloud Apps Managed by Data Security
- API Throttling
- Configure Classification Labels
- Microsoft Labeling for Office 365
- Google Drive Labeling
- Configure Phishing Analysis
- Configure WildFire Analysis
-
-
-
- What is an Incident?
- Assess New Incidents on Data Security
- Filter Incidents
- Configure Slack Notification Alerts on Data Security
- Security Controls Incident Details
- Track Down Threats with WildFire Report
- Customize the Incident Categories
- Close Incidents
- Download Assets for Incidents
- View Asset Snippets for Incidents
- Analyze Inherited Exposure
- Email Asset Owners
- Modify Incident Status
-
-
-
- What’s SaaS Security Inline?
- Navigate To SaaS Security Inline
- SaaS Visibility for NGFW
- SaaS Visibility and Controls for NGFW
- SaaS Visibility for Prisma Access
- SaaS Visibility and Controls for Panorama Managed Prisma Access
- SaaS Visibility and Controls for Cloud Managed Prisma Access
- Activate SaaS Security Inline for NGFW
- Activate SaaS Security Inline for VM-Series Firewalls with Software NGFW Credits
- Activate SaaS Security Inline for Prisma Access
- Connect SaaS Security Inline and Strata Logging Service
- Integrate with Azure Active Directory
-
-
- SaaS Policy Rule Recommendations
- App-ID Cloud Engine
- Guidelines for SaaS Policy Rule Recommendations
- Predefined SaaS Policy Rule Recommendations
- Apply Predefined SaaS Policy Rule Recommendations
- Create SaaS Policy Rule Recommendations
- Delete SaaS Policy Rule Recommendations
- Enable SaaS Policy Rule Recommendations
- Modify Active SaaS Policy Rule Recommendations
- Monitor SaaS Policy Rule Recommendations
-
- Enable Automatic Updates for SaaS Policy Rule Recommendations on Cloud Managed Prisma Access
- Import New SaaS Policy Rule Recommendations on Cloud Managed Prisma Access
- Update Imported SaaS Policy Rule Recommendations on Cloud Managed Prisma Access
- Remove Deleted SaaS Policy Rule Recommendations on Cloud Managed Prisma Access
- Manage Enforcement of Rule Recommendations on NGFW
- Manage Enforcement of Rule Recommendations on Panorama Managed Prisma Access
- Change Risk Score for Discovered SaaS Apps
-
-
-
-
- Onboarding Overview for Supported SaaS Apps
- Onboard an Aha.io App to SSPM
- Onboard an Alteryx Designer Cloud App to SSPM
- Onboard an Aptible App to SSPM
- Onboard an ArcGIS App to SSPM
- Onboard an Articulate Global App to SSPM
- Onboard an Atlassian App to SSPM
- Onboard a BambooHR App to SSPM
- Onboard a Basecamp App to SSPM
- Onboard a Bitbucket App to SSPM
- Onboard a BlueJeans App to SSPM
- Onboard a Box App to SSPM
- Onboard a Bright Security App to SSPM
- Onboard a Celonis App to SSPM
- Onboard a Cisco Meraki App to SSPM
- Onboard a ClickUp App to SSPM
- Onboard a Confluence App to SSPM
- Onboard a Contentful App to SSPM
- Onboard a Convo App to SSPM
- Onboard a Couchbase App to SSPM
- Onboard a Coveo App to SSPM
- Onboard a Crowdin Enterprise App to SSPM
- Onboard a Customer.io App to SSPM
- Onboard a Databricks App to SSPM
- Onboard a Datadog App to SSPM
- Onboard a DocHub App to SSPM
- Onboard a DocuSign App to SSPM
- Onboard an Envoy App to SSPM
- Onboard an Expiration Reminder App to SSPM
- Onboard a Gainsight PX App to SSPM
- Onboard a GitLab App to SSPM
- Onboard a Google Analytics App to SSPM
- Onboard a Google Workspace App to SSPM
- Onboard a GoTo Meeting App to SSPM
- Onboard a Grammarly App to SSPM
- Onboard a Harness App to SSPM
- Onboard a Hellonext App to SSPM
- Onboard an IDrive App to SSPM
- Onboard an Intercom App to SSPM
- Onboard a Jira App to SSPM
- Onboard a Kanbanize App to SSPM
- Onboard a Kanban Tool App to SSPM
- Onboard a Kustomer App to SSPM
- Onboard a Lokalise App to SSPM
- Onboard a Microsoft Azure AD App to SSPM
- Onboard a Microsoft Outlook App to SSPM
- Onboard a Microsoft Power BI App to SSPM
- Onboard a Miro App to SSPM
- Onboard a monday.com App to SSPM
- Onboard a MongoDB Atlas App to SSPM
- Onboard a MuleSoft App to SSPM
- Onboard a Mural App to SSPM
- Onboard an Office 365 App to SSPM
- Onboard an Okta App to SSPM
- Onboard a PagerDuty App to SSPM
- Onboard a RingCentral App to SSPM
- Onboard a Salesforce App to SSPM
- Onboard an SAP Ariba App to SSPM
- Onboard a ServiceNow App to SSPM
- Onboard a Slack Enterprise App to SSPM
- Onboard a Snowflake App to SSPM
- Onboard a SparkPost App to SSPM
- Onboard a Tableau Cloud App to SSPM
- Onboard a Webex App to SSPM
- Onboard a Workday App to SSPM
- Onboard a Wrike App to SSPM
- Onboard a YouTrack App to SSPM
- Onboard a Zendesk App to SSPM
- Onboard a Zoom App to SSPM
- Onboarding an App Using Azure AD Credentials
- Onboarding an App Using Okta Credentials
- Register an Azure AD Client Application
- View the Health Status of Application Scans
- Delete SaaS Apps Managed by SSPM
Onboarding Overview for Supported SaaS Apps
Before you onboard a SaaS app in SSPM, there are certain actions you must
take.
When you onboard a SaaS app to SSPM, you might be
prompted to provide configuration information that SSPM uses to connect to the SaaS app.
The required information varies from app to app. The following table describes the
actions you must take to onboard a particular SaaS app to SSPM. For some supported SaaS
Apps, more detailed onboarding instructions are available by following links that are
provided in the table.
SaaS App | Before Onboarding, Complete the Following Actions | During Onboarding, Complete the Following Actions |
---|---|---|
Aha.io See also Onboard an Aha.io App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. Multi-factor
authentication (MFA) using one-time passcodes must be configured.
|
When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, the MFA secret key, and the instance host
name.
|
Alteryx Designer Cloud | Complete the following steps to enable SSPM to
connect to an Alteryx Designer Cloud API.
| When prompted, provide SSPM with your workspace name and the access token. |
Aptible See also Onboard an Aptible App to SSPM. | Identify the Aptible user account whose login credentials you will supply to SSPM. SSPM will use this account to access configuration information. The user must be assigned to the Rooms Collaborator role, or a role with greater permissions. | When prompted, provide SSPM with the login credentials for the user account. |
ArcGIS See also Onboard an ArcGIS App to SSPM. | SSPM connects to an API and accesses configuration
information through OAuth 2.0 authorization. To enable OAuth 2.0
authorization:
|
|
Articulate Global See also Onboard an Articulate Global App to SSPM. | Identify the Articulate Global administrator account whose login credentials you will supply to SSPM. SSPM will use this account to access configuration information. The administrator must be assigned to the Account Admin role. | When prompted, provide SSPM with the login credentials for the user account. |
Atlassian See also Onboard an Atlassian App to SSPM. |
By onboarding an Atlassian app, you enable SSPM to scan your Jira and
Confluence instances for connected third-party plugins. To enable
these scans, you must also onboard the Jira app or onboard the Confluence app.
From SSPM, you can then view the third party
plugins for Jira or Confluence and take action if necessary.
Complete the following steps to enable SSPM to connect to an
Atlassian API.
| When prompted, provide SSPM with the login email address of the Atlassian administrator who created the API token, the API token, and the API key. |
BambooHR See also Onboard a BambooHR App to SSPM. |
Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
|
When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, the MFA secret key, and the company
domain.
|
Basecamp See also Onboard a Basecamp App to SSPM. | SSPM connects to an API and accesses configuration information through OAuth 2.0 authorization. Identify the administrator account that you will use to log in to Basecamp to grant SSPM access. To grant SSPM the access that it requires, you must log in with an account that has Owner permissions. | When SSPM redirects you to the Basecamp login page, log in to the administrator account and grant SSPM the requested access. |
Bitbucket See also Onboard a Bitbucket App to SSPM. | SSPM connects to an API and accesses configuration information through OAuth 2.0 authorization. Identify the administrator account that you will use to log in to Bitbucket to grant SSPM access. | When SSPM redirects you to the Bitbucket login page, log in to the administrator account and grant SSPM the requested access. |
BlueJeans See also Onboard a BlueJeans App to SSPM. |
Complete the following steps to enable SSPM to connect to a BlueJeans
API.
| When prompted, provide SSPM with App Key and App Secret for your enterprise app. |
Box See also Onboard a Box App to SSPM. |
Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator credentials. If SSPM is connecting to the account through Okta, provide SSPM with your organization's Okta subdomain and the MFA secret key. |
Bright Security See also Onboard a Bright Security App to SSPM. | Identify the Bright Security account whose login credentials you will supply to SSPM. The user must be assigned to the Admin or Owner role. | When prompted, provide SSPM with the login credentials for the administrator account. |
Celonis See also Onboard a Celonis App to SSPM. | Complete the following steps to enable SSPM to
connect to a Celonis API.
| When prompted, provide SSPM with your Celonis team domain URL and the API key that you generated. |
Cisco Meraki See also Onboard a Cisco Meraki App to SSPM. | Complete the following steps to enable SSPM to
connect to a Cisco Meraki API.
| When prompted, provide SSPM with the API key that you generated. |
ClickUp See also Onboard a ClickUp App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with your administrator credentials and, optionally, the MFA secret key. |
Confluence See also Onboard a Confluence App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be
configured.
To enable SSPM to scan your Confluence instance for connected
third-party plugins, you must also onboard the Atlassian app.
| When prompted, provide SSPM with your organization's Okta subdomain, the administrator credentials, and the MFA secret key. |
Contentful See also Onboard a Contentful App to SSPM. | Complete the following steps to enable SSPM to
connect to a Contentful API.
| When prompted, provide SSPM with the access token. |
Convo See also Onboard a Convo App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be
configured.
| When prompted, provide SSPM with your organization's Okta subdomain, the administrator credentials, and the MFA secret key. |
Couchbase See also Onboard a Couchbase App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with your Couchbase tenant ID and the administrator login credentials. |
Coveo See also Onboard a Coveo App to SSPM. | Complete the following steps to enable SSPM to
connect to a Coveo API.
| When prompted, provide SSPM with your Coveo organization ID and the API key. |
Crowdin Enterprise See also Onboard a Crowdin Enterprise App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's domain name, Okta domain, the administrator credentials, and the MFA secret key. |
Customer.io See also Onboard a Customer.io App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Databricks See also Onboard a Databricks App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Datadog See also Onboard a Datadog App to SSPM. | Complete the following steps to enable SSPM to
connect to a Datadog API.
| When prompted, provide SSPM with your Datadog region, the API key, and the Application key. |
DocHub See also Onboard a DocHub App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the user credentials, and the MFA secret key. |
DocuSign See also Onboard a DocuSign App to SSPM | SSPM connects to an API and accesses configuration information through OAuth 2.0 authorization. Identify the administrator account that you will use to log in to DocuSign to grant SSPM access. | When SSPM redirects you to the DocuSign login page, log in to the administrator account and grant SSPM the requested access. |
Dropbox Business See also
Onboard a Dropbox Business App to SSPM. | You can onboard a Dropbox Business app by using OAuth 2.0
authorization or by using Okta SSO. For OAuth 2.0 authorization,
identify the account that you will use to log in to Dropbox Business
to grant SSPM access. To grant SSPM the access that it requires, you
must log in with an account that has Team Admin
permissions. For Okta SSO, complete the following steps to
enable SSPM to access configuration information through an
administrator account. Your organization must be using Okta as an
identity provider. MFA using one-time passcodes must be
configured.
| If using OAuth 2.0 authorization, SSPM will redirect you
to the Dropbox Business login page. Log in to the administrator account
and grant SSPM the requested access. If using Okta SSO, provide SSPM
with your organization's Okta domain, the administrator credentials,
and the MFA secret key. |
Envoy See also Onboard an Envoy App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be
configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Expiration Reminder | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Gainsight See also Onboard a Gainsight PX App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the administrator login credentials and subscription ID. |
Github Enterprise See also
Onboard a GitHub Enterprise App to SSPM. | You can onboard a GitHub Enterprise app by using OAuth
2.0 authorization or by providing SSPM with login credentials. For
OAuth 2.0 authorization, identify the account that you will use to
log in to Github Enterprise to grant SSPM access. To grant SSPM the
access that it requires, you must log in as an Enterprise Owner or
Organization Owner. To provide login credentials to enable
SSPM to access configuration information through an administrator
account.
| If using OAuth 2.0 authorization, SSPM will redirect you
to the Github Enterprise login page. Log in to the Enterprise Owner or
Organization Owner account and grant SSPM the requested access. If
providing login credentials to SSPM, specify the administrator
credentials, MFA secret key, and the name of the organization that
you want SSPM to scan. |
Gitlab See also Onboard a GitLab App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with your the access token and your organization domain URL. |
Google Analytics See also Onboard a Google Analytics App to SSPM. | SSPM connects to an API and accesses configuration information through OAuth 2.0 authorization. Identify the administrator account that you will use to log in to Google Analytics to grant SSPM access. From the account settings, copy the administrator Account ID. | When prompted, provide SSPM with the administrator Account ID. When SSPM redirects you to the Google Analytics login page, log in by using the administrator account and grant SSPM the requested access. |
Google Workspace See also
Onboard a Google Workspace App to SSPM. |
Complete the following steps to enable SSPM to connect to a Google
Workspace API through OAuth 2.0 authorization.
|
|
GoTo Meeting See also Onboard a GoTo Meeting App to SSPM. | SSPM connects to an API and accesses configuration information through OAuth 2.0 authorization. Identify the administrator account that you will use to log in to GoTo Meeting to grant SSPM access. | When SSPM redirects you to the GoTo Meeting login page, log in to the administrator account and grant SSPM the requested access. |
Grammarly See also Onboard a Grammarly App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Harness See also Onboard a Harness App to SSPM. | Complete the following steps to enable SSPM to
connect to a Harness API.
| When prompted, provide SSPM with your API key. |
Hellonext See also Onboard a Hellonext App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the administrator credentials and the organization name. |
IDrive See also Onboard an IDrive App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Informatica Address Doctor | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the tenant ID and the administrator login credentials. |
Intercom See also Onboard an Intercom App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the administrator login credentials and your region. |
Jira See also Onboard a Jira App to SSPM. |
Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
To enable SSPM to scan your Jira instance
for connected third-party plugins, you must also onboard the Atlassian app. | When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Kanbanize See also Onboard a Kanbanize App to SSPM. | Complete the following steps to enable SSPM to
connect to a Kanbanize API.
| When prompted, provide SSPM with your organization's Kanbanize host name and the API key. |
Kanban Tool See also Onboard a Kanban Tool App to SSPM. |
Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
|
When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, the MFA secret key, and the instance host
name.
|
Kustomer See also Onboard a Kustomer App to SSPM. | Complete the following steps to enable SSPM to
connect to a Kustomer API.
| When prompted, provide SSPM with your organization's region and the API key that you generated. |
Lokalise See also Onboard a Lokalise App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, the MFA secret key, and the team domain. |
Microsoft Azure AD See also
Onboard a Microsoft Azure AD App to SSPM. |
SSPM connects to an API and accesses configuration information
through OAuth 2.0 authorization. Identify the administrator account
that you will use to log in to Azure to grant SSPM access. To grant
SSPM the access that it requires, you must log in with an account
that has Microsoft Global Admin permissions.
| When SSPM redirects you to the Microsoft login page, log in to the Global Admin account and grant SSPM the requested access. |
Microsoft Exchange See also
Onboard a Microsoft Exchange App to SSPM. |
High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft Exchange app individually gives you greater
visibility into Microsoft Exchange settings. Complete the following steps to enable SSPM to connect to a Microsoft
API through an Azure AD application that you create.
|
When prompted, provide SSPM with the Microsoft user credentials and
the Client ID of the Azure AD application.
|
Microsoft OneDrive See also
Onboard a Microsoft OneDrive App to SSPM. |
High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft OneDrive app individually gives you greater
visibility into Microsoft OneDrive settings. Complete the following steps to enable SSPM to connect to a Microsoft
API through an Azure AD application that you create.
|
When prompted, provide SSPM with the Microsoft user credentials and
the Client ID of the Azure AD application.
|
Microsoft Outlook See also
Onboard a Microsoft Outlook App to SSPM. |
High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft Outlook app individually gives you greater
visibility into Microsoft Outlook settings. Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator credentials. If SSPM is connecting to the account through an identity provider, specify the information that SSPM needs for MFA. |
Microsoft SharePoint |
High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft SharePoint app individually gives you greater
visibility into Microsoft SharePoint settings. Complete the following steps to enable SSPM to connect to a Microsoft
API through an Azure AD application that you create.
|
When prompted, provide SSPM with the Microsoft user credentials and
the Client ID of the Azure AD application.
|
Microsoft Teams See also Onboard a Microsoft Teams App to SSPM. |
High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Microsoft Teams app individually gives you greater
visibility into Microsoft Teams settings. Complete the following steps to enable SSPM to connect to a Microsoft
API through an Azure AD application that you create.
|
When prompted, provide SSPM with the Microsoft user credentials and
the Client ID of the Azure AD application.
|
Miro See also Onboard a Miro App to SSPM. | Complete the following steps to enable SSPM to
connect to a Miro API. SSPM connects to an API and accesses configuration information
through OAuth 2.0 authorization.
|
|
monday.com See also Onboard a monday.com App to SSPM. | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with your administrator credentials and your account domain. If the administrator account is configured for MFA, provide SSPM with the MFA secret key. |
MongoDB Atlas See also Onboard a MongoDB Atlas App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
MuleSoft See also Onboard a MuleSoft App to SSPM. |
Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, the MFA secret key, and the organization domain name. |
Mural See also Onboard a Mural App to SSPM. | SSPM connects to an API and accesses configuration information through OAuth 2.0 authorization. Identify the administrator account that you will use to log in to Mural to grant SSPM access. You must log in as a workspace admin. | When SSPM redirects you to the Mural login page, log in to the workspace admin account and grant SSPM the requested access. |
Nintex Workflow Cloud | Complete the following steps to enable SSPM to
connect to a Nintex Workflow Cloud API.
| When prompted, provide SSPM with the Client ID and the Client Secret that is associated with your app. |
Office 365 See also Onboard an Office 365 App to SSPM. |
Connecting to Office 365 enables SSPM to
scan settings at a high level based on Microsoft's Secure Score. For
greater visibility into a particular application in the Office 365
product family, onboard the individual product app. SSPM connects to an API and accesses configuration information
through OAuth 2.0 authorization. Identify the Microsoft account that
you will use to log in to Office 365 to grant SSPM access. The
account can grant SSPM reduced permissions for read-only access, but
some SSPM function will not be available. To grant SSPM access to
either the read-only scopes only or access to read and write scopes,
the account must be assigned to the Global Administrator role.
|
|
Office 365 - Productivity Apps |
High-level configuration scanning across
Office 365 products is available by adding the Office 365 app.
Adding the Office 365 - Productivity Apps gives you greater
visibility into Microsoft Word, Microsoft PowerPoint, and Microsoft
Excel settings. Complete the following steps to enable SSPM to connect to a Microsoft
API through an Azure AD application that you create.
|
When prompted, provide SSPM with the Microsoft user credentials and
the Client ID of the Azure AD application.
|
Okta See also Onboard an Okta App to SSPM. | Complete the following steps to enable SSPM to
connect to an Okta API.
| When prompted, provide SSPM with your Admin instance URL and the API token. |
PagerDuty See also Onboard a PagerDuty App to SSPM. |
Complete the following steps to enable SSPM to access configuration
information through an administrator account.
|
When prompted, provide SSPM with the following information:
If SSPM is connecting to the account through an identity provider,
specify the information that SSPM needs for MFA.
|
Ping Identity | Complete the following steps to enable SSPM to
connect to a Ping Identity API.
| When prompted, provide SSPM with the following
information:
|
Pipedrive | Enable SSPM to connect to a Pipedrive API. Log in to Pipedrive as an administrator and copy the administrator's personal API token. | When prompted, provide SSPM with the API token. |
Pivotal Tracker | Complete the following steps to enable SSPM to
connect to a Pivotal Tracker API.
| When prompted, provide SSPM with the API token. |
Power BI See also Onboard a Microsoft Power BI App to SSPM. |
Complete the following steps to enable SSPM to access configuration
information through an administrator account. Your organization must
be using Okta as an identity provider. MFA using one-time passcodes
must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Qualtrics XM | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with the following
information:
|
Redis Labs | Complete the following steps to enable SSPM to
connect to a Redis Labs API.
| When prompted, provide SSPM with the API Account key and the API User key. |
RingCentral See also Onboard a RingCentral App to SSPM. | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Salesforce See also Onboard a Salesforce App to SSPM. | Complete the following steps to enable SSPM to connect to a Salesforce API
through OAuth 2.0 authorization.
|
|
SAP Ariba See also Onboard an SAP Ariba App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account.
| When prompted, provide SSPM with the administrator credentials and your realm name. If SSPM will connect to the account by using direct login, select the FQDN for your SAP Ariba instance. If SSPM will connect to the account through Microsoft Azure, specify the information that SSPM needs for MFA. |
Segment | Complete the following steps to enable SSPM to
access configuration information through an administrator account.
| When prompted, provide SSPM with the user credentials. If MFA is configured for the user, provide the MFA secret key. If MFA is not configured for the user, leave the MFA Secret Key field empty. |
Sentry | Complete the following steps to enable SSPM to
connect to a Sentry API.
| When prompted, provide SSPM with the authentication token. |
ServiceNow See also Onboard a ServiceNow App to SSPM. |
Complete the following steps to enable SSPM to connect to a
ServiceNow API through OAuth 2.0 authorization.
|
|
ShareFile | Complete the following steps to enable SSPM to
connect to a ShareFile API.
| When prompted, provide SSPM with the Client ID and Client Secret. |
Slack Enterprise See also Onboard a Slack Enterprise App to SSPM. | Complete the following steps to enable SSPM to connect to a Slack Enterprise
API.
| When prompted, provide SSPM with the User OAuth Token that you generated. |
Snowflake See also Onboard a Snowflake App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account.
| When prompted, provide SSPM with the login credentials for the user account and your Snowflake account name. |
SparkPost See also Onboard a SparkPost App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
|
When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, and the MFA secret key.
|
Splunk Cloud | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
|
When prompted, provide SSPM with your organization's Okta domain, the
administrator credentials, the MFA secret key, and the Splunk app
domain.
|
Sumo Logic | Complete the following steps to enable SSPM to
connect to a Sumo Logic API.
| When prompted, provide SSPM with the access ID and access key. |
Syncplicity | SSPM connects to an API and accesses configuration information through OAuth 2.0 authorization. Identify the administrator account that you will use to log in to Syncplicity to grant SSPM access. | When SSPM redirects you to the Syncplicity login page, log in to the administrator account and grant SSPM the requested access. |
Tableau See also Onboard a Tableau Cloud App to SSPM. |
Complete the following steps to enable SSPM to access configuration
information through an administrator account.
|
When prompted, provide SSPM with the administrator credentials and
the app subdomain. If SSPM is connecting to the account through an
identity provider, specify the information that SSPM needs for
MFA.
|
Terraform | Complete the following steps to enable SSPM to
connect to a Terraform API.
| When prompted, provide SSPM with the API token. |
TextExpander | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
Tresorit | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be
configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, and the MFA secret key. |
VMWare | Complete the following steps to enable SSPM to
connect to a VMWare API.
| When prompted, provide SSPM with the API token and your organization ID. If you configured MFA for tokens, also provide your MFA secret key. |
Webex See also Onboard a Webex App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account. Your
organization must be using Okta as an identity provider. MFA using
one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, the MFA secret key, and your organization ID. |
Workday See also Onboard a Workday App to SSPM. | SSPM connects to an API and accesses configuration information through OAuth 2.0
authorization and a custom report. Complete the following steps as a
Security Administrator.
| When prompted, provide SSPM with the following information:
|
Wrike See also Onboard a Wrike App to SSPM. | Complete the following steps to enable SSPM to access
configuration information through an administrator account.
|
|
YouTrack See also Onboard a YouTrack App to SSPM. | Complete the following steps to enable SSPM to
connect to a YouTrack API.
| When prompted, provide SSPM with the YouTrack instance name and the permanent token. |
Zendesk See also Onboard a Zendesk App to SSPM. |
Complete the following steps to enable SSPM to access configuration
information through an administrator account.
| When prompted, provide SSPM with the administrator credentials and your Zendesk subdomain. If you configured MFA for Zendesk, or if SSPM is connecting to the account through an identity provider, specify the information that SSPM needs for MFA. |
Zoho One | Complete the following steps to enable SSPM to access configuration information
through an administrator account. Your organization must be using Okta
as an identity provider. MFA using one-time passcodes must be configured.
| When prompted, provide SSPM with your organization's Okta domain, the administrator credentials, the MFA secret key, and your region. |
Zoho WorkDrive | Complete the following steps to enable SSPM to
access configuration information through OAuth 2.0 authorization.
|
|
Zoom See also Onboard a Zoom App to SSPM. |
SSPM connects to an API and accesses configuration information
through OAuth 2.0 authorization. Identify the account that you will
use to log in to Zoom. The account can have reduced permissions for
read-only access, which enables SSPM to perform scans. The following
reduced permissions are required for read-only access:
For full read and write access, which enables SSPM to complete scans
and perform automated remediation, the user account must have the
following permission:
|
|