Authorizations
  • 4 minutes to read
  • Dark
    Light
  • PDF

Authorizations

  • Dark
    Light
  • PDF

Article summary

This document provides information about the Authorizations report screen, which displays the authorizations linked to applications that will consume A2A APIs.

More information in APIs A2A.

Prerequisites

  • System administrator permission.

Path to access

  1. On senhasegura, in the navigation bar, hover over the Products menu and select A2A.
  2. In the side menu, select Applications > Authorizations.

Actions menu

ItemTypeDescription
Add applicationButtonDirects to the Add application screen.
ActionsDropdown menuDisplays the options Print report, Export CSV, and Schedule report.

Search fields

Info

To view all search fields, click More.

ItemTypeDescription
ApplicationDropdown menuFilters authorizations linked to specific applications.
Code. AuthorizationText fieldFilters authorizations by their identification code in senhasegura.
NameText fieldFilters authorizations by their identification name.
EnvironmentText fieldFilters authorizations by the environment where they are used.
SystemText fieldFilters authorizations by the system that consumed the API data.
Creation dateDate pickerFilters authorizations by the period they were created.
StatusDropdown menuFilters authorizations by their activation state. The options are Enabled or Disabled. Clear the field to enable the All option.

Report fields

  • Code. Authorization: displays the application linked to the authorization(s) and the identification code of the authorization(s).
  • Name.
  • Environment.
  • System.
  • Creation date: displays the date and time of the authorization's creation.
  • PAM resource permission: displays the access permission to PAM Core. The options are Read-only and Read-write.
  • Status.
  • Actions:
    • Add authorization: opens the Add authorization screen.
    • Download: displays the decryption key to view sensitive information protected in API call responses. Sensitive information includes PAM Core resource credentials and the System resource fingerprint. More information in How to decrypt sensitive data using a private key.
    • View: opens the Application Authorization screen.
    • Edit: opens the Edit authorization screen.
Info

By default, the report displays 30 records per screen. To go to the next screen, click the forward button at the bottom of the report.

Application Authorization screen

This screen displays information about the selected application's authorization.

  • Authentication method: authentication method used by the authorization.
  • Application: application's identification name.
  • Client identifier: unique code that identifies the application, varying according to the authentication method:
    • Client ID: used for OAuth 2.0 authentication.
    • Consumer key: used for OAuth 1.0 authentication.
    • Access key ID: used for AWS authentication.
  • Secret key: secret used to authenticate the application, varying according to the authentication method:
    • Client Secret: used for OAuth 2.0 authentication. Sensitive information. Click Show to display.
    • Consumer Secret: used for OAuth 1.0 authentication. Sensitive information. Click Show to display.
    • Secret Access Key: used for AWS authentication. Sensitive information. Click Show to display.
  • Token: used for OAuth 1.0 authentication.
  • Token secret: used for OAuth 1.0 authentication.
  • Amazon ARNs: unique identifiers for Amazon resources.
  • Credentials: information about the credentials the authorization can access.

Add/Edit authorization screen

The Add authorization and Edit authorization screens share the same fields.

Settings tab

ItemTypeRequiredDescription
Expiration dateDate and time pickersNoSets the expiration date and time of the authorization. Leave blank and use the Status > Disabled component to deactivate the authorization manually.
Status*Radio buttonYesSets the authorization status as Enabled or Disabled.
SystemDropdown menuNoSelects the system that will consume the API data.
EnvironmentDropdown menuNoSelects the environment where the application will be used.

Security tab

ItemTypeRequiredDescription
Authorized resourcesCheckboxNoSelects the resources available to the application. The options are PAM Core, Certificate Manager, Task Manager, Dashboards, Web Proxy Session, Users, System, and A2A.
Enable sensitive information encryption?*Radio buttonYesDefines whether sensitive information will be encrypted. The options are Yes or No.
PAM resource permission*Radio buttonYesDefines access to PAM Core as Read-only or Read and write.

Authorized IPs section (use * to allow any IP)

ItemTypeRequiredDescription
AddButtonNoEnables the Address field to add authorized IP addresses for using the authorization. The * (asterisk) allows access from any IP address.
Select itemsCheckboxNoSelects added IP addresses and enables the Remove selected button.

Authorized HTTP referrers section (any origin allowed by default)

ItemTypeRequiredDescription
AddButtonNoEnables the Address field to add URLs authorized for using the authorization with an HTTP referrer. If no URL is entered, any origin is allowed.
Select itemsCheckboxNoSelects authorized URLs and enables the Remove selected button.

Certificate validation section

ItemTypeRequiredDescription
Certificate fingerprintText fieldNoAdds the certificate fingerprint for additional protection.

Credential tab

ItemTypeRequiredDescription
Access credentialDropdown menuNoSelects the credential linked to the authorization.
Create a new credentialCheckboxNoAllows the creation of a new access credential for the authorization.
DeviceDropdown menuNoSelects the device linked to the new access credential.
UsernameText fieldNoDefines the username of the new access credential.
PasswordText fieldNoDefines the password of the new access credential.
AddButtonNoAdds the credential to the authorization.
CredentialsTableNoLists added credentials and their information: ID, Credential, Device, and Type.
Select itemsCheckboxNoSelects credentials in the Credentials table and enables the Remove selected button.

Devices tab

ItemTypeRequiredDescription
AddButtonNoOpens the Devices modal.
Select itemsCheckboxNoSelects devices in the Devices table and enables the Remove selected button.
DevicesTableNoLists added devices and their information: ID, Name, Management, Type, and Vendor.

Protected information tab

Info

Starting with version 3.26, the Protected information module has been replaced by MySafe. Learn more in MySafe.

ItemTypeRequiredDescription
AddButtonNoOpens the Protected information modal.
Select itemsCheckboxNoSelects information in the Protected information table and enables the Remove selected button.
Protected informationTableNoLists protected information and their details: ID, Name, Type, and Owner.

Review tab

This tab displays a summary of the authorization's configurations with the Back or Save buttons.


Was this article helpful?

What's Next