Connect Palo Alto IoT Security (BETA)

Elisity supports simple API connectivity to Palo Alto IoT Security as a method to enrich IT, IoT, IoMT and OT device discovery and identity. This allows data from Palo Alto IoT Security to be pulled into IdentityGraph for use as Core Effective Attributes when creating policies, enhancing the precision and accuracy of device classification and Policy Group matching.

Prerequisites

  • API Path (Provided by Palo Alto)
  • Customer ID (Provided by Palo Alto)

  • Key ID (Generated in IoT Security)
  • Access Key (Generated in IoT Security)

Steps to Connect Palo Alto IoT Security

Palo Alto API Instructions

1. Create an API User in IoT Security by logging into Palo Alto IoT Security and navigating to Preferences under your User NameIn the User Role & Access section find the API Access Key and next to it click Create

A notification about the access key will be displayed, simply select Create again. 

Another notification will pop up with details about the newly generated API Key information however the Access Key will be obfuscated for security reasons. Select Download to retrieve the Key ID and Access Key securely. 

 

2. Log into Elisity Cloud Control Center and navigate to Settings > Connectors and select + Add Connector button. 

 

3. A list of tiles will slide out from the right side of the screen. Select configure on the Palo Alto IoT Security

 

 

4. Input the API Path, Customer ID, and the newly generated Key ID and Access Key and select Submit.

 

5. If all of the required connector values are correct, all checks will pass and the connector will be created. 

After successful configuration, you should begin to see devices enriched by Palo Alto IoT Security in IdentityGraph.

 

Leveraging Palo Alto IoT Security with Elisity

When Elisity discovers a new asset on the network and the Palo Alto IoT Security connector is active, Cloud Control Center queries the IoT Security platform via API for additional device attributes in order to enrich IdentityGraph. This enriched data is displayed in the IdentityGraph tab of the device and can be leveraged as Elisity Core Effective Attributes for Policy Group definition. 

To learn more about how to leverage IdentityGraph Core Effective Attributes review the IdentityGraph article. 

 

If a device discovered by Elisity is also known in Palo Alto IoT Security, the Trust Attribute flag for "Known in Palo Alto IoT Security" will be set to Yes. You can then leverage this trust attribute as match criteria in Policy Group definition. 

To learn more about how to leverage IdentityGraph Trust Attributes review the Leveraging Trust Attributes for Policy Group Definition article.

 

Was this article helpful?
0 out of 0 found this helpful