Akamai WAF
Akamai WAF
Overview
The Akamai WAF integration connects the Praetorian Guard Platform (PGP) with your Akamai Application Security (Kona Site Defender / App & API Protector) configuration, importing WAF security policies, rules, and configuration details into your attack surface. Understanding your WAF posture — which policies are active, what rules are enforced, and which applications are protected — is essential for identifying gaps in your defensive coverage.
This integration is ideal for organizations using Akamai's web application firewall who want centralized visibility into their WAF configuration alongside the rest of their security posture. PGP imports your security configurations as assets, allowing you to track WAF coverage across your attack surface and identify applications that may be unprotected or running outdated rule sets.
What the Integration Does
When connected, PGP performs a read-only import from the Akamai Application Security API:
Security Configurations as Assets: Each Akamai Application Security configuration is imported as a PGP asset. Configuration details — including the configuration name, ID, and associated hostnames — are captured, giving you a complete inventory of your WAF deployments.
Security Policies: Policies within each configuration are tracked, including their protection settings and operational modes (alert vs. deny). This lets you verify that enforcement is active where it should be.
Protected Hostnames as Seeds: Hostnames covered by your WAF configurations are imported as PGP seeds, ensuring that WAF-protected applications are included in your continuously monitored attack surface.
Data flows one direction only — from Akamai into PGP. The integration never writes back to Akamai, modifies security configurations, or changes WAF rules.
Prerequisites
Before setting up the integration, you need Akamai EdgeGrid API credentials with Application Security API access:
Log in to Akamai Control Center
Navigate to Identity & Access Management under the account menu
Select the API Users tab
Click Create API Client (or select an existing user)
Under API Client Details, click Create Credential
Record the following values — they are only shown once:
Client Token
Client Secret
Access Token
API Host (e.g.,
akab-xxxxx.luna.akamaiapis.net)
Ensure the API client has READ access to the Application Security API (sometimes listed as Kona Site Defender or App & API Protector)
The API credentials must have read-only permissions to the Application Security API.
Setup
Go to Integrations, then Firewalls, then Akamai WAF in the Guard Platform
Enter your EdgeGrid credentials in the setup form
Click Connect — PGP will validate your credentials by fetching your security configurations before saving
If validation fails, PGP will report the specific error. Common issues include an incorrect API host, expired credentials, or missing Application Security API permissions.
What Data Is Synced
Security Configurations
Each Akamai Application Security configuration creates an asset with:
Asset name: Derived from the security configuration name
Asset type: WAF configuration
Metadata: Configuration ID, description, and associated contract/group information
Security Policies
Policies within each configuration are tracked with:
Policy name and ID: Identifying the specific security policy
Operational mode: Whether the policy is in alert-only or deny (blocking) mode
Rule sets: Which WAF rule sets and versions are active
Protected Hostnames
Hostnames associated with each security configuration are imported as seeds:
API Endpoints Used
Base URL: https://{your-api-host} (e.g., https://akab-xxxxx.luna.akamaiapis.net)
All requests are authenticated using Akamai EdgeGrid signing. The integration has a timeout of 180 seconds per sync operation.
Troubleshooting
Security and Data Handling
Read-only access: The integration only reads data from Akamai Application Security. It never creates, modifies, or deletes security configurations, policies, or rules.
Credential handling: Your EdgeGrid credentials (Client Token, Client Secret, Access Token) are stored as encrypted credentials within PGP and are never exposed in logs or the UI after initial entry.
Authentication: Credentials are used to sign requests via the Akamai EdgeGrid authentication protocol over HTTPS. Request body size is limited to 128KB per the EdgeGrid configuration.
Data filtering: Imported assets and seeds pass through PGP standard filtering rules, allowing you to control which configurations and hostnames are included in your attack surface.