

Create a new Playbook and follow the below gif / step-by-step guide, the code being uploaded to github repo as well:.Where Resource represents a group of related entities, fore more details please visit MCAS Activities API The following table describes the actions supported: For more information about API tokens, see Managing API tokens., here's an example of CURLing MCAS Activity log: For example, if your portal's URL is, then your API URL is /api.Ĭloud App Security requires an API token in the header of all API requests to the server, such as the following: Once you have the portal url, add the /api suffix to it to obtain your API URL. In the Cloud App Security about screen, you can see the portal url. In the Cloud App Security portal, click the question mark icon in the menu bar. To obtain the Cloud App Security portal URL for your tenant, do the following steps: To use the Cloud App Security API, you must first obtain the API URL from your tenant.
#CLOUDAPP SIGN IN UPDATE#
Applications can use the API to perform read and update operations on Cloud App Security data and objects. The Microsoft Cloud App Security API provides programmatic access to Cloud App Security through REST API endpoints.
/article-new/2019/10/cloudappupdate1.jpg)
This will enable you to gain visibility into your cloud apps, get sophisticated analytics to identify and combat cyberthreats, and control how your data travels, more details on enabling and configuring the out of the box MCAS connector ( Connect data from Microsoft Cloud App Security)Ĭloud App Security REST API (URL Structure, Token & Supported Actions) The Microsoft Cloud App Security (MCAS) connector lets you stream alerts and Cloud Discovery logs from MCAS into Azure Sentinel.
