- play_arrow Overview
- play_arrow Juniper Advanced Threat Prevention Cloud Overview
- play_arrow Juniper Advanced Threat Cloud Prevention Setup
-
- play_arrow Juniper ATP Cloud Web Portal
- play_arrow Juniper ATP Cloud Web Portal Overview
-
- play_arrow Enroll SRX Series Firewalls in Juniper ATP Cloud Web Portal
- play_arrow Enroll and Manage SRX Series Firewalls
-
- play_arrow Monitor Juniper ATP Cloud Features
- play_arrow Reports
- play_arrow Hosts
- play_arrow Identify Infected Hosts
- play_arrow Threat Sources
- play_arrow Identify Hosts Communicating with Command and Control Servers
- play_arrow IoT Device Discovery and Classification
- play_arrow Reverse Shell
- play_arrow Files
- play_arrow E-mails
- play_arrow Statistics
- play_arrow DNS
- play_arrow Encrypted Traffic Insights
-
- play_arrow Configure Juniper ATP Cloud Features
- play_arrow Allowlists and Blocklists
- play_arrow Email Scanning: Juniper ATP Cloud
- play_arrow File Inspection Profiles
- play_arrow Adaptive Threat Profiling
- play_arrow Feeds Configuration
- play_arrow Infected Hosts
- play_arrow Threat Intelligence Sharing
- play_arrow Misc Configurations
-
- play_arrow More Documentation
- play_arrow ATP Cloud Tech Library Page Links
-
Application Tokens Overview
Use the Application Token page to view or add application tokens that allow Security Director or Open API users to securely access Juniper ATP Cloud APIs over HTTPS. Using the available buttons, you can mark tokens as active or inactive.
When a token is used, you can view the IP address of the user and the date of last usage by clicking the token name. Then you can block or unblock IP addresses that are trying to use individual tokens. An application token is marked inactive if it has not been used for 30 days. Once inactive, all access using the token is blocked until it is activated again. If an application token has not been used for 90 days, it is automatically deleted and cannot be recovered again.
Benefits of Application Tokens
Limits the applications that can use Juniper ATP Cloud APIs and Juniper ATP Cloud threat information to only those that are authorized. For example, you can limit who has access to your shared threat information by creating an application token for TAXII. See Configure Threat Intelligence Sharing.
Allows you to easily activate or deactivate a token from one central location.