Lookout Product Documentation

Find answers about using and optimizing Lookout products.

App Access and Dynamic DRM

If you selected Dynamic DRM, you must also select App Access.

  1. Enter the following proxy-related information for App Access and Dynamic DRM protection.
    • Additional Domains - Optionally you can configure any additional domains for inspection.

      For example, you can configure shortened URLs or any custom domains that represent app specific traffic.

    • Bitbucket Workspace Id - Configure the Bitbucket Workspace Id. This option is displayed only if you select the Bitbucket application in the Application suite

      To locate the Workspace Id, log in as the Bitbucket administration user, navigate to Settings, select Workspace Settings, and locate the Workspace Id value.

    • Email Domain - Enter all the email domains that you use to sign into the app. For example, if you sign in with user@example.com, enter example.com. If you have multiple email addresses, enter them as comma-separated values.
    • Organization ID - Enter the OrgId of the Atlassian App Suite. You need an Atlassian Access plan to connect to the Org.

      To find out the org ID, login to admin.atlassian.com with Org Admin privileges. If you have access to more than one Organization, select the one for which you want to know the Org Id. Check the URL in the address bar, which resembles this format:

      https://admin.atlassian.com/o/orgID/overview.

      Copy the OorgID value from the address bar.

      If your Atlassian app was onboarded before 23.3 release, the app resolution works for your existing Atlassian applications without any change. However, if you want to update the existing Atlassian application, you must update the Organization ID from the Management Console.

    • Restricted Modules: From the list, select the modules that you want to restrict or bypass.
    • Restriction Behavior: Select one of these options. The selected value will determine whether to block the traffic for a restricted module or to bypass the proxy.
      • Bypass Proxy - The modules selected for restriction will bypass the proxy.
      • Block - The modules selected for restriction will be blocked.
  2. Click Next to enter authorized user information for users or user groups.
    1. Click New.
    2. Select User or User Group.
    3. For User:
      • Click in the User box; then select All or Selected.
      • For All, click Save.
      • For Selected, enter the valid usernames of the users to include and click Save.
    4. Click Add.
    5. For User Group:
      • Click in the User Group box. Go to the Directories prompt, select the user group and click the right-arrow symbol to move it to the Selected list.
      • Click Save.
      • Click Add.

        The users and user groups you added appear in the Authorized Users list.

  3. Click Next.
    To request a new key, click Request New Key. A key request will be sent to the administrator.
  4. Click Save.