- play_arrow Overview
- play_arrow Juniper Advanced Threat Prevention Cloud Overview
- play_arrow Juniper Advanced Threat Cloud Prevention Setup
-
- play_arrow Juniper ATP Cloud Web Portal
- play_arrow Juniper ATP Cloud Web Portal Overview
-
- play_arrow Enroll SRX Series Firewalls in Juniper ATP Cloud Web Portal
- play_arrow Enroll and Manage SRX Series Firewalls
-
- play_arrow Monitor Juniper ATP Cloud Features
- play_arrow Reports
- play_arrow Hosts
- play_arrow Identify Infected Hosts
- play_arrow Threat Sources
- play_arrow Identify Hosts Communicating with Command and Control Servers
- play_arrow IoT Device Discovery and Classification
- play_arrow Reverse Shell
- play_arrow Files
- play_arrow E-mails
- play_arrow Statistics
- play_arrow DNS
- play_arrow Encrypted Traffic Insights
-
- play_arrow Configure Juniper ATP Cloud Features
- play_arrow Allowlists and Blocklists
- play_arrow Email Scanning: Juniper ATP Cloud
- play_arrow File Inspection Profiles
- play_arrow Adaptive Threat Profiling
- play_arrow Feeds Configuration
- play_arrow Infected Hosts
- play_arrow Threat Intelligence Sharing
- play_arrow Misc Configurations
-
- play_arrow More Documentation
- play_arrow ATP Cloud Tech Library Page Links
-
Create Application Tokens
To access this page, click Administration > Application Tokens. You can generate application tokens from the App Tokens page.
Review the Application Tokens Overview topic.
Note that an application token is marked inactive if it has not been used for 30 days. Once inactive, all access using the token is blocked until it is activated again. If an application token has not been used for 90 days, it is automatically deleted and cannot be recovered again.
Note that when you generate an application token, you must copy and paste it at the time of generation. Once you close the generation screen, the token is no longer available for copying.
To generate an application token:
Field | Description |
---|---|
Name | Enter a unique name for this token. This must be a unique string that only contains, letters, numbers, and dashes; no spaces allowed; 32-character maximum. |
Description | Enter a description for your token; maximum length is 1024 characters. You should make this description as useful as possible for all administrators. |
Access Type | Select one or both check boxes to generate an application token for Security Director and/or Third Party feeds. |
When you generate a token, it is active by default. To deactivate a token or activate it again:
Select the check box beside the application token.
Click the Deactivate button. Use the Activate button to reinstate the token after it’s deactivated.
When you click an application token name, you can view the IP addresses of devices that have used the token and the time the token was utilized. To block and IP address or unblock it:
Select the check box beside the IP address.
Click the Block button. Use the Unblock button to reinstate access to the IP address.