Datadog - Create User
  • 10 Nov 2024
  • 2 Minutes to read
  • Dark
    Light
  • PDF

Datadog - Create User

  • Dark
    Light
  • PDF

Article summary

Datadog - Create User creates a Datadog user for each user returned by the saved query supplied as a trigger (or devices selected in the asset table).

See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.

Note:

Required Fields

These fields must be configured to run the Enforcement Set.

  • Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
  • Configure Dynamic Values - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.

  • Use stored credentials from Datadog adapter - Select this option to use Datadog connected adapter credentials.
    • When you select this option, the Select Adapter Connection drop-down becomes available. Select the adapter connection to use for this Enforcement Action.
Note:

To use this option, you must successfully configure an Datadog adapter connection.

Additional Fields

These fields are optional.

  • First Name - The new user's first name.
  • Last Name - The new user's last name.
  • Email - The new users email address.
  • Username - The username by which the new user will be known in Datadog.
  • First-login password generation method - The method used to generate the first login password for the user to gain access. When Manual password is selected, enter a password in the Password field. This password will be used by all new users created by this Enforcement Action until they change it.

  • Datadog Domain - The hostname or IP address of the Datadog server.
  • Application Key and API Key - API and Application Keys associated with a user account that has the Required Permissions to perform this action.
  • Verify SSL (optional) - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
  • HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.
  • Gateway Name - Select the Gateway through which to connect to perform the action.

For more details about other Enforcement Actions available, see Action Library.


Was this article helpful?