- 3 minutes to read
- Print
- DarkLight
- PDF
How to configure A2A
- 3 minutes to read
- Print
- DarkLight
- PDF
Welcome to A2A, the management platform for senhasegura's A2A APIs.
This document provides a step-by-step guide to help system administrators configure the A2A module to integrate their applications with senhasegura's APIs efficiently and securely. A2A centralizes credential management, enhancing security and streamlining API access.
Although OAuth 2.0 is the recommended authentication method, the module also supports secure integrations with other protocols, such as OAuth 1.0 and AWS.
How to authenticate an application in A2A.
Prerequisites
- System administrator permission.
Path to access
- On senhasegura, in the navigation bar, hover over the Products menu and select A2A.
Add an application
To add an application to A2A, follow the steps below:
Access Applications > Applications.
On the Applications screen, click Add.
On the Add application screen, fill in the required fields:
- Application name*: enter a name that clearly identifies the client application. Example: Financial Application - ERP Integration.
- Use OAuth signature*: choose the desired authentication method. Example: OAuth 2.0.
- Status*: set the application status to Enabled or Disabled. Example: Enabled.
After completing the required fields and, if needed, the optional ones, click Save.
Result: you’ve added an active application to A2A and can now add an authorization to obtain an access token and consume A2A APIs.
Add an authorization key for the application
After adding a client application to A2A, you need to add an authorization so your application can consume senhasegura APIs:
On the Applications screen, find the added application or use the search filters. Example: Enter Financial Application - ERP Integration in the Name filter.
In the Actions button, click Authorizations.
On the Application authorization screen, click Add.
On the Add authorization screen, fill in:
AlertThe fields with an asterisk are mandatory.
Settings tab:
- Expiration date and time: define the authorization validity period. Example: 01/30/2025 and 6:00 PM, or leave blank for manual deactivation.
- Status*: Select Enabled or Disabled to define the authorization status. Example: Enabled.
- System and Environment: choose where the authorization will be used. Example: System X and Test environment.
- Click Continue.
Security tab:
- Authorized resources: select the resources the application can access using the authorization. Example: PAM Core.
- Enable encryption of sensitive information*: enable or disable as needed to ensure the security of sensitive information. Example: No.
- PAM resource permission*: choose between Read-only to view data or Read and write to view and modify data. Example: Read-only.
Selecting Read and write grants permission to modify resources. Ensure this authorization is appropriate, as it may pose security risks.
- Authorized IPs: enter the addresses allowed to use the authorization. Use * (asterisk) to allow any IP. Example: 192.168.1.1.
- HTTP referrers: define the origins (URLs) allowed to make calls using the authorization. Example: https://erp.financial.com/dashboard.
The HTTP referer is an HTTP header sent by the browser or HTTP client that informs the URL of the origin page of a request. You can specify which URLs are authorized to make calls to your application, helping ensure that only trusted sources can interact with your APIs.
- Click Continue.
Result: you’ve added and configured an authorization for the client application that will consume the A2A APIs and can obtain an access token.
Credential tab:
- Select an existing credential or create a new one. Example: Local Administrator - marksmith.
- If creating a new credential:
- Select the Device.
- Fill in the Username and Password for the access credential.
- Click Continue.
Devices tab:
- Click Add to select devices linked to the authorization.
- Click Continue.
Protected information tab:
- Click Add to select the sensitive information authorized for access.
- Click Continue.
InfoStarting with version 3.26, the Protected information module has been replaced by MySafe. More information in MySafe.
Review tab:
- Review all configurations.
- If needed, click Back to make changes.
- Click Save.
Next steps
Explore also:
Other features:
Available A2A APIs:
- PAM Core: identity and permission management.
- Certificate Manager: certificate management.
- Related Users: user and permission management.
- Dashboards: access to dashboards and metrics.
- System: management of Network Connector Agents.
Other senhasegura APIs:
- DevOps Secret Manager: secret management for DevOps pipelines.
- MySafe: management of corporate personal and team passwords and other items.
- SCIM: provisioning and management of user identities.
Best practices:
- Consult our Best practices for use, which includes recommendations on security, token usage, and authorization.