⚠️ Unpublished: This item is from a solution that is not yet published on Azure Marketplace or not installed in Content Hub.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | Authomize |
| Publisher | Authomize |
| Used in Solutions | Authomize |
| Collection Method | REST Pull API |
| Connector Definition Files | AuthomizeCustomConnector.json |
| Ingestion API | HTTP Data Collector API — Connector definition requires workspace key (SharedKey pattern) |
| Custom Log V1 Tables | Yes 🔶 — ingests into tables with type-suffixed columns |
The Authomize Data Connector provides the capability to ingest custom log types from Authomize into Microsoft Sentinel.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
Authomize_v2_CL 🔶 |
? | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): read and write permissions are required. - Keys (Workspace): read permissions to shared keys for the workspace are required. See the documentation to learn more about workspace keys.
Custom Permissions: - Include custom pre-requisites if the connectivity requires - else delete customs: Description for any custom pre-requisite
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
1. Locate your Authomize API key
Follow the setup instructions located under Data Connectors for Authomize.
2. Deploy the Authomize data connector using the setup instructions.
Follow the Instructions on deploying the data connector to ingest data from Authomize.
3. Finalize your setup
Validate that your script is running. Simple instructions are located under the Authomize Data Connector area.
📄 Source: Authomize\Data Connectors\readme.md
You will need the following before you start this installation: - Access to a keyvault with the ability to deploy secrets, note that we suggest authomize as the name, but you can use an existing vault or create a new one with a different name. - Access to App Registration under AAD (For more secure method you can optionally setup an ID for the function you deploy) - Access to be able to create azure app functions from your azure portal - Access to an azure storage account - by default this applocation will create a small table using AzureWebJobsStorage connection string
authomizeToken - this is the Token generated in your Authomize tenant. Go to the configurations page, click API Tokens and select a Platform Token. Save this token in a safe place to be used later, ensure you save it as pure text with no formatting.CustomerID - this is the workspace id in your Logs analytics workspace.sharedKey - this is the Logs analytics workspace. Go to the configurations page.You will now create the secrets that the Authomize connector for Azure Sentinel will use.
authomizeTokenCustomerIDsharedKeyThis is an Example using Azure CLI to create or you can do this from within the Portal
```
** First create the vault to use
az keyvault create --name authomize --resource-group
** Now create each of the secrets
az keyvault secret set --vault-name authomize --name authomizeToken --value "
At this point, please get your vault URI, it will be needed later in the configuration of the application. You can find it under overview within the keyvault that you created. Here is an example https://authomizexxx.vaultxxx.azure.net/
New RegistrationRegisterAdd a certificate or secretNew Client SecretsValue and leave in safe place as we will need this laterAccess policiescreateGet and List then click nextnext and Create when you get to the review screenWe will do this through the cli, you will need access to the authomizeconnector.zip file and authorization to deploy
az functionapp create \
--resource-group
** From the directory wehere the ZIP file is located run
az webapp deployment source config-zip \
--resource-group
2. Create the Function App configurations using the CLI (you can do this in the portal if you wish)
- You'll need to collect the following information some of this you have already collected
- Tenant ID: collect the Tenant ID, you can find this in the overview of the default Azure AD environment
- Application (Client) ID: this can be found by searching for the app registration you did before, find the display name and it is listed to the right
- Client Secret: this is theValuethat you created before with the app registration. Look at the above section "Creating your Application within Azure AD", you would have saved these values to be used later
- Following are the CLI commands to be used to create the configuration for the Function App
az functionapp config appsettings set \
--name authomize-sentinel-connect \
--resource-group keyvaulttests \
--settings AZURE_CLIENT_ID="
```
az functionapp config appsettings set --name authomize-sentinel-connect --resource-group keyvaulttests --settings VAULT_URL="https://exampleVault.vault.azure.net/"Special call out note - PLEASE READ
AzureWebJobsStorage setting which is created by default. The application will create 1 table with the name of authomizeDate. The application will check every time it runs to see if this table exists and will only store a date here. Every time the application executes it will update the date. It uses this date to know when it last collected data from Authomize. If this date is deleted, the application on its next run will collect all open Incidents until the current date. You can also manually create the date time and field yourself if for instance you only want to have the last 3 months of data collected from Authomize.Monitoring the application and expected behavior
Viewing the connector monitor screen you should see an output similar to this. This is an example of a single execution with no data being collected:
2023-09-05 01:50:00.852 Table already exists Error
2023-09-05 01:50:00.873 Entity already exists Error
2023-09-05 01:50:00.979 Status: Started processing. Information
2023-09-05 01:50:00.979 INFO: --Processing-- [1] Information
2023-09-05 01:50:01.391 Status: Stopped processing. Information
2023-09-05 01:50:01.391 INFO: No data to send, skipping process steps. Information
NOTE: the Error statements above are by design and is part of the checking process for the Table and Fields.
When there is data to be processed, you will see multiple INFO statements like the following:
2023-09-04T20:50:04Z [Information] Data sent to Sentinel.
2023-09-04T20:50:04Z [Information] INFO: --Processing-- [4]
2023-09-04T20:50:05Z [Information] Data sent to Sentinel.
2023-09-04T20:50:05Z [Information] INFO: --Processing-- [5]
2023-09-04T20:50:05Z [Information] Data sent to Sentinel.
2023-09-04T20:50:05Z [Information] INFO: --Processing-- [6]
2023-09-04T20:50:06Z [Information] Data sent to Sentinel.
2023-09-04T20:50:06Z [Information] INFO: --Processing-- [7]
2023-09-04T20:50:07Z [Information] Data sent to Sentinel.
2023-09-04T20:50:07Z [Information] INFO: --Processing-- [8]
2023-09-04T20:50:07Z [Information] Data sent to Sentinel.
2023-09-04T20:50:07Z [Information] INFO: --Processing-- [9]
Regularly check the logs for errors or issues, such as certificates expiring or being deleted from any of the systems being used.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊