Software Secure Access
Activity Manage

Step 2 – Confirm Connectors

After connector instances launch, they automatically connect to Secure Access. Before you can use connectors, you must accept the connectors in Secure Access to confirm that they are expected and legitimate:

  1. In Secure Access, navigate to Connect > Network Connections, and then click Connector Groups.
  2. Expand Confirm Connectors .
  3. If necessary, wait up to 15 minutes for just-deployed connectors to launch and reach out to Secure Access.
  4. Review the list of deployed connectors to ensure that all are expected and legitimate.

    The Origin IP Address of the connector may indicate where the connector is located, which may help you determine if it is legitimate.

    If there are connectors in the list that you are unsure about, you can revoke or disable them before you confirm the others. Disabled connectors will still be confirmed but will be inactive; revoked connectors will not be confirmed. Revoking a connector invalidates the current provisioning key and generates a new key, so you will need to use the new key for subsequent connectors that you deploy. For more information, see Disable, Revoke, or Delete Resource Connectors and Groups.

  5. To confirm all connectors in the list, click Confirm Connectors.