The authentication token must be included in the Authorization field of your request header. Make sure you have obtained the authentication token from the Cloud App Security management console before creating your request.
You can create more than one authentication token for external applications to use, but only one authentication token for Apex One as a Service.
A maximum of 20 authentication tokens in total is supported.
The name cannot exceed 128 characters and the description cannot exceed 1,024 characters.
The Log Retrieval and Threat Investigation APIs apply only to the selected targets in enabled Cloud App Security policies.
If you select... |
Do the following... |
---|---|
User account under Threat Mitigation |
Click Click here to provide your Microsoft Office 365 Global Administrator credentials to grant permission to obtain user account related data. |
Email message and user account under Intelligent Investigation |
Click Click here to provide your Microsoft Office 365 Global Administrator credentials to grant permission to access user profiles and mailboxes. |
The authentication token can be created successfully without performing authorization, but the corresponding APIs cannot work properly due to lack of full permission to access service data. Trend Micro recommends that you complete the required authorization either during the token creation or immediately after the token is created.
The generated token is displayed on the Automation and Integration APIs screen.
Option | Description |
---|---|
Edit an authentication token |
|
Delete an authentication token |
Select the token and click Delete. Any subsequent API request message that contains the deleted authentication token will fail. |
Refresh an authentication token |
Select the token and click Refresh. Typically, 10 days before the authentication token expires, Cloud App Security sends an alert email message to your mailbox. An authentication token is valid for 365 days since being generated. After the expiration time, the token becomes invalid. Any subsequent API request message that contains the invalid authentication token will fail. You can choose to delete the current token and add a new one, or select the invalid token and refresh it. The token itself will change after it is refreshed. |
Fill the authentication token in the Authorization field of the API request header in the following format: Bearer <authentication token>.
For more information, see Understanding the Request Header.