ms.service: entra-external-id
ms.subservice: external
ms.topic: how-to
ms.date: 10/21/2025
ms.author: cmulligan
ms.custom: it-pro
---
### Grant access to the Akamai API to perform actions
Create [EdgeGrid authentication credentials](https://techdocs.akamai.com/developer/docs/set-up-authentication-credentials) and note all the generated information (`client_secret`, `host`, `access_token`, `client_token`). You reuse these values later in the setup.
Additionally, update the **API restrictions** for the actions to the appropriate access level shown in the following table:
| Title | Description | Access level |
|----|----|----|
| [Microsoft Edge Diagnostics](https://developer.akamai.com/) | Microsoft Edge Diagnostics | READ-WRITE |
| [Property Manager (PAPI)](https://developer.akamai.com/api/luna/papi/overview.html) | Property Manager (PAPI). PAPI requires access to Microsoft Edge Hostnames. Edit your authorizations to add HAPI to your API Client. | READ-ONLY |
ms.service: entra-external-id
ms.subservice: external
ms.topic: how-to
ms.date: 01/29/2026
ms.author: cmulligan
ms.custom: it-pro
---
## Verify Akamai WAF in External ID
After completing the configuration steps, verify that Akamai WAF is protecting your external tenant by connecting the authentication credentials to the WAF configuration.
:::image type="content" source="media\how-to-configure-akamai-integration\choose-waf-provider.png" alt-text="Screenshot of the choose WAF provider page.":::
6. Create an Akamai account. If you don't have an account yet, create and purchase one in the [Security Store](https://securitystore.microsoft.com/solutions/akamai-technologies.akamai_wapplusion_public).
7. To grant access to the Akamai API to perform actions, create [EdgeGrid authentication credentials](https://techdocs.akamai.com/developer/docs/set-up-authentication-credentials) and note all the generated information (`client_secret`, `host`, `access_token`, `client_token`). You reuse these values later in the setup process.
Additionally, update the **API restrictions** for the actions to the appropriate access level shown in the following table: