PagerDuty
Configuring the Veza integration for PagerDuty
Overview
The Veza integration for PagerDuty connects to the incident management platform to gather authorization for users that are configured in PagerDuty, their base role for the PagerDuty application, and their assigned Teams and Team roles.
Configuring PagerDuty
To authenticate with PagerDuty, Veza requires an API key for a PagerDuty user. To generate this API key (also referred to as a token):
Log in to PagerDuty.
Click the Integrations menu button in the middle of the PagerDuty screen, then click API Access Keys.
Click the Generate new API Key button to obtain an access token.
Enter a description, click on Create Key and Save the API token. Copy the token value to use when configuring Veza.
See the PagerDuty documentation for the most up-to-date guidance.
Configuring PagerDuty on the Veza Platform
In Veza, open the Integrations page..
Click Add Integration and pick PagerDuty as the type of integration to add.
Enter the required information and Save the configuration.
Field | Notes |
---|---|
Insight Point | Choose whether to use the default data plane or a deployed Insight Point. |
Name | A descriptive name to identity the unique integration. |
PagerDuty URL | URL for PagerDuty API endpoint including protocol (such as |
PagerDuty Token | The token used to access the PagerDuty API |
Notes and Supported Entities
Veza creates Authorization Graph nodes to model PagerDuty teams, users, roles, and role permissions:
PagerDuty Business → PagerDuty Application
PagerDuty Team → PagerDuty Resource
PagerDuty Team → PagerDuty Group
PagerDuty User → PagerDuty User
PagerDuty User Role → PagerDuty Role
PagerDuty User Role → PagerDuty Permission
This connector uses the PagerDuty API to extract the identity and authorization information for users. Users are connected by identity based on their email address configured in PagerDuty.
PageDuty Teams are represented both as a local group and a resource. If the User has a Team Role it is represented on the resource. The Local Group can be used for purely membership queries, while role assignments to the resource should be used to audit a user's permission within a PagerDuty Team.
PagerDuty User
Attribute | Description |
---|---|
| PagerDuty User ID |
| PagerDuty User name |
| The email address configured for the PagerDuty user |
| Boolean value if user is a billed user in PagerNow |
| True if user is a global admin |
PagerDuty Group
Attribute | Description |
---|---|
| PagerDuty Group ID |
| PagerDuty Group name |
| Truncated team description |
| Default role for new users assigned to the Team |
| Summary value for Team |
PagerDuty Team (as Resource)
Attribute | Description |
---|---|
| PagerDuty Team ID |
| PagerDuty Team name |
Last updated