Seraphic Security
Overview
Seraphic Security provides an enterprise browser security platform that protects users and data across any browser or web app by embedding a lightweight agent for threat prevention, data loss protection, and compliance enforcement. The platform enables organizations to secure access and enforce consistent security policies across managed, BYOD, VDI, and third-party endpoints by operating natively at the browser layer, applying security baselines directly inside the browser without requiring OS-level controls.
Available Integrations
| Product(s) | Supported Asset Type(s) | Integration Type |
|---|---|---|
| Seraphic Security | Devices | Source |
Why You Should Integrate
Integrating with Seraphic Security will provide insight into your devices being managed by Seraphic Security.
How Does the Integration Work
This integration works by pulling information about devices from Seraphic Security using its REST API.
This data is only used internally; we do not share it with any parties outside of Sevco. Refer to our privacy policy for details.
Please review the configuration instructions in the section below before setting up permissions for apps.Configuration
- Install a runner: Follow our instructions to install a runner.
- Configure the Access Schema
| Field | Description | Example |
|---|---|---|
Base URL* | The base URL of your Seraphic Security tenant's region | https://us-public-api.seraphicsecurity.com |
Skip TLS Certificate Validation | Skip certificates validation when using a certificate that is self-signed or unable to be validated through a proper certificate authority. | n/a |
API Key* | The API Key generated in your Seraphic Security console | ********************* |
-
Add an Integration: Select the integration(s) you'd like to add.
- Collect devices
-
Configure General Information: OPTIONAL: You can use the following fields to provide additional information about your configuration.
| Field | Description | Example |
|---|---|---|
Name (optional) | Uniquely identifiable attribute of the configuration to delineate other similar configurations with the existing organization. | DMZ network |
Contact Person (optional) | A placeholder to input a name or email address of a contact associated with the integration. | Jane Doe |
Link to Console (optional) | A placeholder to input a link to the console of the product Sevco is integrating with for quick reference and access when configuring or editing the integration. | www.product.com/devices |
Email me about frequent errors | Select this toggle to receive an email whenever an Integration has a ≥30% error rate in a 24-hour period. | n/a |
- Activate Config: Select "Activate" to enable this configuration and begin pulling data.
External Documentation
Creating credentials
You will be asked to provide credentials that Sevco will use for the integrations. This link will take you through the steps for generating an API Key to configure the Access Schema.
Required Permissions
The account used to generate an API Key must have the following minimum permissions:
READ: Agents
API Documentation
Updated about 1 hour ago
