How to Tag Application instances

  • 23 May 2024
  • 0 replies
  • 138 views

Badge +6

y0hA0d3Zs4LD7zn0kR-IF00LpHD8GKS8CgTvIzN149iiXYoST7-HGu6EJ6gbs2Wo9LaitENCkCti6AkTPcHJWaWW-Z55McjxryyKNJVG9feUVQ5SbAokFZKMCFCCzlM3DUlfgYw8hcZ7DXGMXOAjIAY

Netskope Global Technical Success (GTS)

Use Case - How to Tag Application instances

 

Netskope Cloud Version - 113

 

Objective

Tag Application instances on the tenant

 

Prerequisite

Netskope Inline CASB license is required

 

Context

Customers in the Adoption process seek to limit access to approved applications within their environment. Specifically, they aim to permit access solely for their corporate instance IDs of applications. This article will outline a potential approach for enabling access to corporate-sanctioned instances while preventing access to other applications in the same category. 

 

Do You Know?

  • Netskope introduced the concept of Application instance Tagging in addition to Application Tagging as a result of which you can Tag Instances of an Application as Sanctioned / Unsanctioned. Here is a document link that demonstrates the process : Link

 

Configuration

There are 2 approaches at present to Tag the Application instances in the tenant. For demonstration purpose, I have considered 2 different Applications -

 

Method 1 : Application instance tagging via Application events

Path: Netskope Tenant UI >>> Skope IT >>> Applications - - - Choose the App you want to Tag the instance for >>> New App Instance 

3eM6ZQWrDSETdwrn5tC53ZuluTD1EKZft-KX-kXuM44lZlAC3KG4iJ0IIwU9-y0wZGpXAl5jtz4NtLsdDiK4B5c-Inc92LQ0qfuKkPn3PYfb76s_Grp3WBOBCiGR2fEho-61fwkGLBhPIDSuGoK6zEI

1txvzXenzUWYwMFBDW0fzs5y2J5n5D3wNtHD9vlcBRPtCXP0T1m52vbhpCDoR1LJ5nBGDGK0utg9TnOsDka8JpfYwqSya_0oRBVa73CoSzR8BJXD2Ly63-hNDq_zE6Ma_EIaGhQpa_3WfcdreuTVmCc

 

Method 2 : Application instance tagging via App Instance profile

Path: Netskope Tenant UI >>> Policies >>> Profiles >>> App Instance - - - New Custom App Instance - - - New App Instance

0mpy96qbkJlLo-mRMmhpUoVKB4rhlpJtVmGkXUtuhJfOJN8BebD2yMgpghCAKpZCj7yZ-BY6QNU_tl_ciNJGHhd6yyG-8hxESvlnWpj0zcfz5ayEP3JPL8vyI8T7DWSv1tKLgSTaOZAut5M4SfjyQoA

 

After creating the App Instance, please enter the necessary details and Click Save

CC5XYA9ZfuuhiS-lQidHTjJVlAJplnJaLZvokeTPYjrZJPR5U2TU9URc4l2WoBucKa6XyuBOr_HzexI0DdrcA1QGPkP3sJeYeVWCWedjvivXbFsLts0bLI3uAjZrzu4TkgcntZK4jtuH60cx0sh3Qbc

 

The App Instance is now ready to be used in a Real time protection policy

iUsYMocnDSuLsCL-wjELZIZultU4O1xmtW8NtEtA_x2JrFZDJHtf86AGvG4v-KeHnzjIrNDuanC-UqHOqmN_q-eL0YM7Bz6HQFT4qtwgpjBl6CNsQifj6uQzMHlnBlYnnAWVi14W7OI8FdHNhcypo2Q

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 


0 replies

Be the first to reply!

Reply