Skip to content

Connecting Your First Integration

Seliq connects to your existing security tools rather than replacing them. This page covers connecting your first source. For a full list of supported integrations, see the Integrations Overview.

When you connect a source, Seliq:

  1. Authenticates using the credentials you provide (API key, OAuth token, or service principal)
  2. Performs an initial backfill of recent alerts (configurable, default: last 72 hours)
  3. Sets up continuous polling or webhook delivery depending on the source type
  4. Begins AI triage as soon as the first batch arrives

Credentials are encrypted at rest and never exposed in the UI after the initial setup.

Required: Azure AD service principal with Security Reader role on the target workspace.

  1. In the Azure portal, create a service principal under Azure Active Directory → App registrations
  2. Assign the Security Reader role scoped to your Sentinel workspace
  3. Note the Tenant ID, Client ID, and Client Secret
  4. In Seliq, go to Settings → Integrations → Add Source → Microsoft Sentinel
  5. Enter your Tenant ID, Client ID, Client Secret, and the Sentinel workspace resource ID
  6. Click Test connection — a green indicator confirms access

After saving an integration, Seliq runs a connectivity check and attempts to pull a sample of alerts. The integration card shows one of three states:

StatusMeaning
ConnectedCredentials are valid and alerts are flowing
⚠️ DegradedConnected but fewer alerts than expected — check your filter settings
FailedAuthentication or network error — check credentials and firewall rules