Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Application Tokens Overview

Use the Application Token page to view or add application tokens that allow Security Director or Open API users to securely access Juniper ATP Cloud APIs over HTTPS. Using the available buttons, you can mark tokens as active or inactive.

When a token is used, you can view the IP address of the user and the date of last usage by clicking the token name. Then you can block or unblock IP addresses that are trying to use individual tokens. An application token is marked inactive if it has not been used for 30 days. Once inactive, all access using the token is blocked until it is activated again. If an application token has not been used for 90 days, it is automatically deleted and cannot be recovered again.

Benefits of Application Tokens

  • Limits the applications that can use Juniper ATP Cloud APIs and Juniper ATP Cloud threat information to only those that are authorized. For example, you can limit who has access to your shared threat information by creating an application token for TAXII. See Configuring Threat Intelligence Sharing.

  • Allows you to easily activate or deactivate a token from one central location.