- 4 minutes to read
- Print
- DarkLight
- PDF
How to manage authorizations in A2A
- 4 minutes to read
- Print
- DarkLight
- PDF
This document provides a step-by-step guide on how to manage authorizations for applications that will consume the APIs managed in A2A.
Prerequisites
- Application added to A2A. More information in How to manage applications in A2A.
- System administrator permission.
Path to access
- On senhasegura, in the navigation bar, hover over the Products menu and select A2A.
- In the side menu, select Applications > Authorizations.
Add authorization
To add an authorization for an application in A2A, follow these steps:
On the Authorizations screen, find the desired application or use the search filters.
In the Actions column, click Add authorization, represented by the plus icon.
On the Add authorization screen, fill in:
AlertFields with an asterisk are required.
Configuration tab
- Expiration date: select the expiration date and time for the authorization, or leave the field blank for manual deactivation.
- Status*:** set the authorization’s status to Enabled or Disabled.
- System: select the system that will consume the API data.
- Environment: select the environment in which the application will be used.
- Description: enter additional notes about the authorization.
- Click Continue.
Security tab
- Authorized resources: select the resources available for the application. The options are PAM Core, Certificate Manager, Task Manager, Dashboards, Web Proxy Session, Users, System, and A2A.
- Enable encryption of sensitive information?*: decide if sensitive information such as credentials from the PAM Core resource and fingerprints from the System resource will be encrypted in the API response. The options are Yes or No.
- PAM resource permission:* choose the level of access to PAM Core. The options are Read-only and Read and write.
- Authorized IPs (use * to allow any IP): click Add to open the Address field and add IP addresses allowed to use the authorization for API calls. Use * (asterisk) to allow any IP.
- Authorized HTTP referers (by default allow any source): click Add to open the Referer field and add authorized URLs to make calls using the authorization. By default, any origin is allowed.
- Certificate validation - Certificate fingerprint: enter the certificate fingerprint for additional protection.
- Click Continue.
Credential tab
- Access credential: choose the credential linked to the authorization.
- Create a new credential: check this box to create a new access credential for the authorization.
- Device: select the device linked to the new credential.
- Username: define the username of the new access credential.
- Password: enter the password for the new access credential.
- Add: click to add the credential to the authorization.
- Click Continue.
Devices tab
- Add: click to open a table and add devices.
- Click Continue.
Protected information tab
##### Add: click to open a table and add protected information.
##### Click Continue.
InfoStarting with version 3.26, the Protected information module has been replaced by MySafe. Learn more in MySafe.
- Review tab
- Review the authorization configuration summary.
- Click Back to adjust settings or Save to complete.
View authorization
To view the details of an application's authorization, follow the steps below:
- On the Authorizations screen, find the desired application or use the search filters.
- Click the Actions button and select View.
- On the Application authorization screen, view information about the authorization. The data displayed will depend on the authentication method used. More information in Authorizations.
- Click Show to view sensitive information, such as the Client Secret.
Edit authorization
To edit an authorization's details, follow the steps below:
- On the Authorizations screen, find the desired authorization or use the search filters.
- Click the Actions button and select Edit.
- On the Edit authorization screen, make the necessary changes.
- Click Save.
Download decryption key
If you choose to Enable encryption of sensitive data in the Security tab while adding the authorization, sensitive data such as credentials and the fingerprint of a Network Connector Agent will be protected in API responses. To download the decryption key and access this data in readable form, follow the steps below:
- On the Authorizations screen, find the desired authorization or use the search filters.
- Click the Actions button and select Download.
- Click Yes on the confirmation pop-up to generate the decryption key.
- Copy the decryption key and keep it in a secure location.
More information in How to decrypt sensitive data using a private key.
Disable authorization
Disabling an authorization is an alternative to setting an expiration date. If you didn’t specify an expiration date and time for the authorization, it’ll remain active until you disable it. Follow the steps below:
- On the Authorizations screen, find the desired authorization or use the Status > Enabled filter.
- In the enabled authorizations report, find the desired authorization or use the search filters.
- Click the Actions button and select Edit.
- In the Configuration tab, locate the Status component and select Disabled.
- In the Review tab, click Save.
Enable authorization
To enable a disabled authorization, follow the steps below:
- On the Authorizations screen, locate the Status filter and select Disabled.
- In the disabled authorizations report, find the desired authorization or use the search filters.
- Click the Actions button and select Edit.
- In the Configuration tab, locate the Status component and select Enabled.
- In the Review tab, click Save.
Do you still have questions? Reach out to the senhasegura Community.