Akamai integration

Prev Next

Update (April 2025 - June 2025)

The integration documentation has been updated to reflect enhancements and important behavioral clarifications:

    • New Configuration Fields:

      • Target(s) – You must now select one or more targets: Threat Actors, Custom Signature, or Malicious Sources IP Range. At least one must be selected to enable the integration.

      • Network ListID — This is Required for IP and threat actor-based blocking. All IPs are appended to a single, reusable list.

    • Improved Clarity on Setup Requirements:

      • Detailed prerequisites added for creating or reusing Akamai policies.

      • Explained when to clone an existing policy and how to attach and activate a network list.

      • Sequence clarified: Create policy → Attach list → Activate → Use IDs in integration.

    • Custom Signature Rule Behavior:

      • Now includes guidance on activation delays and limitations on pushing multiple rules simultaneously.

      • Notes that new custom rules cannot be created while the previous version is still activating.

    • New Section: Viewing WAF Configuration Rules:

      • Custom signature rules: View via Security Configurations → Custom Rules.

      • IP-based rules: View via Web Security → Network Lists.

    These changes improve accuracy, provide operational clarity, and support successful integration setup and validation.

Akamai Web Application Firewall (WAF) is a robust cloud-based security solution that protects web applications from malicious attacks such as SQL injection, cross-site scripting (XSS), and other common threats. Integrating Traceable with Akamai WAF enhances the security posture by leveraging Traceable's deep API observability, AI-driven insights, and anomaly detection. This integration helps organizations gain comprehensive visibility into their API traffic and security events while benefiting from the scalable protection Akamai WAF provides. Together, they offer a powerful solution to detect, prevent, and respond to sophisticated threats targeting modern web applications and APIs.

Traceable’s integration with Akamai supports the following three types of rules:

  • IP range rules

  • Threat actor

  • Custom signature rules

The following is a high-level integration diagram:

Make a note of the following points regarding threat actors and IP range blocking:

  • Threat actor — Any status change of the threat actor on the Traceable Platform is propagated to Akamai. For example, if Traceable detects a threat actor and changes it to a deny state, then the requests from this threat actor can be blocked using Akamai. Moreover, if you make any changes, such as adding a threat actor to the denylist or resolving the status, then such changes are reflected in Akamai in a few minutes.

  • IP-range blocking — If you configure any custom rules to enforce blocking, the action will be executed through Akamai.

Note

Akamai only supports block action.


Before you begin

Make a note of the following before you proceed with the integration:

  • Akamai integration supports custom signature rules. Keep the following points in mind for custom signature rules.

    Note

    Akamai supports only these two operators for custom signature:

    • Exactly match

    • Does not match

    This means that custom signatures created using regular expressions is not supported.

    Custom signature attributes

    Supported/Not supported

    Request URL

    Not supported

    Request header name

    Supported

    Request header value

    Supported

    Request parameter name

    Supported

    Request parameter value

    Not supported

    Request HTTP method

    The following are supported:

    • GET

    • POST

    • HEAD

    • PUT

    • DELETE

    • HTTP_DELETE

    • OPTIONS

    • TRACE

    • CONNECT

    Request host

    Supported. It has to be in the format, for example, example.com, text.ai etc.

    Request user agent

    Supported

    Request body

    Not supported.

    Request cookie name

    Supported.

    Request cookie value

    Supported.

    Request header

    Supported. Make a note of the following points:

    • Request Header Key supports only exactly match action.

    • Request Header Value only supports exactly match/not match.

    Request cookie

    Supported. Make a note of the following points:

    • Request Cookie Key supports only exactly match action.

    • Request Cookie Value only supports exactly match/not match.

    Request parameter

    Supported. Make a note of the following points:

    • Request Parameter Key supports only exactly match action.

    • Request Parameter Value only supports exactly match/not match.

  • Ensure you understand the Akamai network list, policy, and how to attach a network list to a policy.


Configuration

Complete the following steps to integrate Akamai with Traceable:

Step 1 — Navigate to WAF screen

Log into your Traceable account and navigate to Integrations → WAF.

Step 2 — Configuration

Complete the following configurations:

Integration name and Description

Provide a name for the Integration and describe the type of integration, such as dev, production, etc. Description is an optional field.

Environment

Choose the environment for which you wish to integrate Akamai. You can also choose All Environments, which will integrate Akamai with all the available environments.

Note

Each environment can have more than one Akamai integration.

Target(s)

The Target(s) field allows you to select one or more enforcement categories for which the integration will take action. The available options include:

  • Threat Actors – Blocks IP addresses associated with known or suspected threat actors.

  • Custom Signature – Applies blocking rules based on user-defined signature patterns.

  • Malicious Sources IP Range – Targets known malicious IP ranges for enforcement.

Depending on the scope of protection you want to configure through Akamai, you can select one, multiple, or all available options.

To proceed with the integration, at least one target must be selected. If no target is selected, the integration setup will not be allowed.

Akamai host

Provide the Akamai host. Contact your Akamai administrator to fetch this value.

Akamai configuration ID

Provide the Akamai configuration ID. Contact your Akamai administrator to fetch this value.

Akamai Policy ID

Add the ID of the policy that you wish to integrate with Traceable. Each integration can have only one Policy ID. If you want to integrate more than one policy, create separate integrations.

Navigate to Web and Data Center Security → Security Configurations in your Akamai account. All the security policies are listed in the Security Configurations. Each policy has a Policy ID. Choose the Policy ID for which you want to complete the integration.

Note

You can create only one integration with a unique policy ID in the same environment or across environments.Your content goes here

Network List ID

The Network List ID field references an existing network list configured in the Akamai Control Center. This list is required for IP-based blocking and threat actor rule enforcement. All IP addresses sent through the Traceable integration are appended to the specified network list, which must be associated with an activated Akamai policy.

Each time a new IP address or threat actor is identified, it is automatically pushed to the same network list. This centralized list is continuously updated without requiring the creation of new custom rules or policy versions. Once the network list is configured and activated, Traceable handles subsequent additions through API calls without user intervention.

Note

Custom signature rules behave differently from IP-based rules. Each update to a custom signature rule results in the creation of a new Akamai policy version, which must be activated before enforcement begins. While activation is in progress (typically 7–8 minutes), the new rule is not active, although existing rules remain in effect.

During this activation window, no additional custom signature rules can be pushed. Akamai does not allow cloning or modifying a policy version that is in the middle of an activation cycle. Attempting to do so may result in integration failure or silent rejection. Subsequent custom rules must wait until the previous version has completed activation before being processed.

Prerequisites

Before configuring the integration, ensure the following:

The Network List must be explicitly attached to the Akamai policy you plan to use with the Traceable integration. This is a required step. The integration will fail validation if the network list is not attached to the selected policy version.

There are two supported approaches depending on your scenario:

  • Suppose you are creating a new policy specifically for this integration. In that case, it is recommended that the policy be created, the network list be attached during configuration, and the policy ID and network list ID be activated before retrieving the policy ID and network list ID.

  • If you want to use an existing policy that is already active, note that Akamai does not allow modifying active versions. In this case, you must:

    1. Clone the existing policy to create a new version.

    2. Attach the network list to this unactivated version.

    3. Activate the new version.

Once the policy version and network list are active and associated, use their IDs in the Traceable integration. This combination is validated during setup. If the list is not found to be attached to the activated policy, the integration will fail validation.

  • A network list is created in the Web Security section of the Akamai Control Center.

  • The network list is attached to a policy version that has not yet been activated.

  • The updated policy version is then activated. Akamai does not allow editing of an already activated policy version.

  • The Policy ID and Network List ID used in the integration must reference active and associated configurations.

Retrieving the Network List ID

To obtain the Network List ID:

  1. Log in to the Akamai Control Center.

  2. Navigate to Web Security → Network Lists.

  3. Open the browser’s developer tools and go to the Network tab.

  4. Click the desired network list entry. The request URL or response payload will display the Network List ID.

  5. Copy the portion of the ID that appears before the query parameters.

Note

Only network lists that are attached to active policy versions can be used in the integration.

Behavior

When an IP address or threat actor is blocked through Traceable, the corresponding entry is added to the network list. Akamai then initiates an automatic activation cycle that takes approximately 5–7 minutes to complete. During this time, previously active entries continue to function normally.

If an IP address appears in multiple rule types (IP and threat actor), it is removed from the network list only after being deleted from all associated types. Deleting the Traceable integration removes all IPs added by Traceable from the network list; the list itself is retained.

Notification Emails

The Notification Emails field accepts one or more email addresses that will receive activation status alerts related to the integration. Notifications are sent when configurations are updated, IPs are added or removed, or policy changes are activated.

The notification mechanism uses a push-based model. A default internal address may be used for system-level logging if no email addresses are provided.

Akamai Auth Credentials

Provide the Access token, Client token, and Client Secret.

Step 3 — Test connection and save

Test the connection. The Save button is enabled only after the connection test is successful.


View the WAF rules

Rules generated through this integration can be viewed directly in the Akamai Control Center. How and where these rules appear depend on the target type selected in the configuration.

For Custom Signature rules:

  • Navigate to Web and Data Center Security → Security Configurations → Custom Rules.

  • Locate the policy used in the integration to view active rules pushed by Traceable.

  • If the same rule exists across multiple policies, its behavior (e.g., allow, deny) will vary by policy.

  • Rules cannot be deleted from Akamai if any active policy version uses them.

  • When Traceable deletes a rule, its status is updated to Not Used in Akamai.

  • Deleting the integration does not remove custom rules from Akamai, as active configurations may use them.

For IP-based Threat Actor and Malicious IP Range rules:

  • Navigate to Web Security → Network Lists.

  • Open the associated network list to view all IPs pushed by Traceable.

  • All IP updates occur within the same list. IPs remain active unless explicitly removed.

  • If the same IP is associated with multiple rule types, it is only removed after deletion from all associated sources.

Note

  • A maximum of 100 rules are allowed in Akamai. If rule creation fails due to Akamai’s 100-rule limit, users must manually delete rules via the Akamai console. Once the rule count drops below 100, successful creation events are generated for valid configurations.