Connection Configurations

You need Connection Configurations to build communication between the Akamai infrastructure and the Protector software, as well as to monitor the connection settings. Protector is an integral component of App & API Protector Hybrid that is installed on your infrastructure to analyze, monitor, and protect your web traffic. Yet before you deploy it on your network, you need to define the Connection Configuration setup in Akamai Control Center and generate a registration token. Learn how to create a Connection Configuration.

To reach App & API Protector Hybrid Connection Configurations page:

  1. Visit Akamai Control Center and log in.
  2. Go to ☰ > WEB & DATA CENTER SECURITY > App & API Protector Hybrid > Connection Configurations.
  3. Expand the Connection Configuration you want to review. You can find here information on:
    1. General settings. It lists your configuration name, description, connection ID, Contract and Group ID, and the Protector deployment type. To modify your Connection Configuration name or description, click the pencil icon next to these fields.
    2. Connection details. If your deployment type is a reverse proxy, you can also find the target host/IP details and listening ports. If needed, click the pencil icon to modify these fields:
      1. Target host/IP. IP address or hostname where traffic is sent on its way to the origin application. It may be the application load balancer (ALB) or the origin application itself.
      2. Target port(s). The port that your origin application or ALB uses to listen for incoming traffic. If you enter multiple ports, separate each port number with a comma. Protector will also listen on the same port(s) you specify. Ensure the provided ports are open on the target host.
    3. Protector details. In this section you can see the minimum detected version of the Protector software that App & API Protector Hybrid has identified across all of your instances listed in the Instances tab. You need this information to monitor the level of protections available for your apps. Each new Protector release unlocks new features in the Security Configuration that is linked to the Connection Configuration. We highly recommend monitoring the software version your instances are running and upgrading Protector to the latest version available. Also note that Akamai only supports (that is provides updates, security patches, or technical assistance) the last three releases of the Protector software.
    4. Security Configuration. This section provides details on the associated Security Configuration and information on whether it is compatible with the installed Protector version or not. From this section you can view, link, unlink, and update your Security Configuration.

🚧

Each Connection Configuration generates a unique token used to authenticate the connection between the Akamai services and Protector installed on your infrastructure. Tokens are tied to specific deployment types they were created for. You cannot reuse a token generated for one deployment type in another.

Learn how to manage Connection Configurations and monitor Protector instances.

Manage Connection Configurations

How to edit and delete Connection Configurations.

Edit Connection Configurations

You can make changes to your Connection Configuration’s name and description at any time and they will apply as soon as you introduce them. To edit a Connection Configuration’s name and description:

  1. Visit Akamai Control Center and log in.
  2. Go to > WEB & DATA CENTER SECURITY > App & API Protector Hybrid > Connection Configurations.
  3. Find the Connection Configuration you want to edit and expand its view. You can also click the action button and select Edit.
  4. Click the pencil icon next to the Connection Configuration’s name or description and make desired changes. The changes are applied as soon as you enter them.

Delete your Connection Configuration

If you delete your Connection Configuration, it will be permanently removed (along with its instances) from our database. The web application firewall and custom rules will be removed from Protector instances running on your infrastructure and they won’t protect your traffic any longer.

👍

Note that the Security Configuration associated with the Connection Configuration that you’re deleting will not be deleted along with it, and you can use it in another Connection Configuration.

To delete your Connection Configuration:

  1. Visit Akamai Control Center and log in.
  2. Go to > WEB & DATA CENTER SECURITY > App & API Protector Hybrid > Connection Configurations.
  3. Find the Connection Configuration you want to delete and click its action menu.
  4. Select Delete and confirm your choice.

To see the deleted Connection Configurations, go to App & API Protector Hybrid Connection Configurations page and select the Show deleted Connection Configurations checkbox. The list shows the last five Connection Configurations that have been deleted. To see details, click the action menu by a given Connection Configuration and select View.

Unlink a Security Configuration from your Connection Configuration

If you want to change the security settings for your Connection Configuration, simply unlink the Security Configuration associated with it:

  1. Visit Akamai Control Center and log in.
  2. Go to > WEB & DATA CENTER SECURITY > App & API Protector Hybrid > Connection Configurations.
  3. Find the Connection Configuration from which you want to unlink the Security Configuration and expand it.
  4. Click Unlink and confirm your choice.

🚧

Unlinking a Security Configuration disables all associated protections and may put your apps at risk. To keep your apps secure, click Complete setup after you unlink a Security Configuration and link your Connection Configuration to an existing Security Configuration or create a new Security Configuration while completing the setup.

Unlinked Security Configurations remain accessible in the App & API Protector Hybrid Security Configurations table and you can link them to new Connection Configurations if needed.

Link a Security Configuration to your Connection Configuration

If you’ve created a Connection Configuration without finishing your security setup or if you’ve unlinked a Security Configuration from your Connection Configuration, you can always go back to the creation wizard and complete setup.