Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Juniper ATP Cloud User Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Application Tokens Overview

date_range 24-Sep-23

Use the Application Token page to view or add application tokens that allow Security Director or Open API users to securely access Juniper ATP Cloud APIs over HTTPS. Using the available buttons, you can mark tokens as active or inactive.

When a token is used, you can view the IP address of the user and the date of last usage by clicking the token name. Then you can block or unblock IP addresses that are trying to use individual tokens. An application token is marked inactive if it has not been used for 30 days. Once inactive, all access using the token is blocked until it is activated again. If an application token has not been used for 90 days, it is automatically deleted and cannot be recovered again.

Benefits of Application Tokens

  • Limits the applications that can use Juniper ATP Cloud APIs and Juniper ATP Cloud threat information to only those that are authorized. For example, you can limit who has access to your shared threat information by creating an application token for TAXII. See Configure Threat Intelligence Sharing.

  • Allows you to easily activate or deactivate a token from one central location.

footer-navigation