Skip to main content

SurePath AI Traffic Flows

Updated over 2 weeks ago

Overview

This guide focuses on the technical network flows used to route generative AI traffic to SurePath AI. It covers SASE Forward-to-Proxy and Proxy PAC URL models, with and without upstream TLS interception. Configuration is intentionally generalized here; detailed, vendor-specific setup is linked for reference.

Terminology

  • SurePath AI Proxy: The TLS proxy that inspects and governs traffic to public GenAI services before forwarding to the destination.

  • Forward-to-Proxy: A SASE policy action that chains GenAI traffic from your SASE proxy to the SurePath AI Proxy.

  • Proxy PAC URL: A Proxy Auto-Config file URL that directs only GenAI domains to the SurePath AI Proxy while sending other traffic normally.

  • Root CA (SurePath AI Root CA): The SurePath AI certificate authority that endpoints (or upstream devices) must trust to avoid TLS warnings when SurePath AI decrypts and inspects traffic.

  • Public Services Catalog: The downloadable, curated list of GenAI domains used by SASE policies and the PAC file to steer traffic.

Endpoints, hostnames, and ports

Component

Hostname / Range

Ports

Notes

PAC file host

pacfile.surepath.ai

443/tcp

Endpoints retrieve PAC over HTTPS

SurePath AI HTTP/S Proxy (PAC deployments)

*.edge.surepath.ai

8080/tcp, 8443/tcp

PAC determines port selection

SurePath AI HTTP/S Proxy (SASE deployments)

edge.surepath.ai

8080/tcp

SASE Forward-to-Proxy target

SurePath AI Edge IPs

69.67.160.0/23

per above

For allow-listing and validation

Integrating traffic with SurePath AI

At a high level, both methods steer only GenAI domains to SurePath AI for governance. SASE deployments chain traffic with a Forward-to-Proxy action from the SASE vendor to the SurePath AI Proxy. Proxy PAC URL deployments configure endpoints to use a PAC file that sends matching traffic directly to the SurePath AI TLS proxy.

  • SASE integrations use a Forward-to-Proxy configuration inside your SASE platform to chain traffic to SurePath AI

  • Proxy PAC URL integrations rely on a TLS proxy operated by SurePath AI to decrypt and govern GenAI sessions

  • The SurePath AI Root CA is required for Proxy PAC URL and recommended for SASE, especially when decryption exceptions at the SASE layer might prevent upstream decryption before traffic reaches SurePath AI

Use Cases

Choose SASE Forward-to-Proxy if your organization already routes web traffic through a SASE platform and you want centralized policy, posture controls, and consolidated logging across your security stack.


Choose Proxy PAC URL when you need a rapid deployment without SASE, when your primary target is browsers or ChromeOS, or to pilot/roll out to specific user groups using MDM or browser admin controls.

Traffic flows

SurePath AI supports two primary types of integrations: SASE and Proxy PAC URL. SASE is the preferred method but for customer without a SASE solution or a compatible SASE solution, SurePath AI leverages MDMs to push out a customer-specific proxy PAC URL directly to the endpoints. Both methods result in only specific AI domains being forwarded to SurePath AI for analysis while non-AI traffic is sent via normal or direct routes. Below are descriptions and diagrams of different iterations of SASE and Proxy PAC URL traffic flows.

Proxy Auto-Configuration (PAC)

Endpoints retrieve the PAC file and direct only GenAI traffic to the SurePath AI TLS proxy while sending other traffic normally. Requests to public GenAI services are tunneled to SurePath AI Edge and inspected under the SurePath AI Root CA trusted by the endpoint.

Configuration steps:

  1. Create the Proxy connector in Admin > Configure > Connectors

  2. Distribute the Proxy PAC URL via your MDM or browser admin

  3. Deploy the SurePath AI Root CA to endpoints

Proxy Auto-Configuration (PAC) with TLS inspection

A customer-managed firewall performs TLS inspection for outbound HTTP/S traffic, and the endpoint trusts the firewall’s CA. The PAC still directs GenAI traffic to the SurePath AI HTTP/S proxy. The SurePath AI Root CA must be installed on the firewall so that SurePath AI inspection of tunneled GenAI sessions succeeds end-to-end.

Configuration steps:

  1. Ensure endpoints trust the firewall CA Root certificate

  2. Create the Proxy connector

  3. Distribute the Proxy PAC URL via MDM or browser admin

  4. Install the SurePath AI Root CA on the firewall performing TLS intercept

SASE with TLS inspection using Forward-to-Proxy (proxy chaining)

The SASE platform performs TLS intercept and then forwards GenAI traffic to the SurePath AI Proxy using a Forward-to-Proxy action based on the Public Services list. The SurePath AI Root CA must be installed on the SASE platform to allow downstream SurePath AI inspection.

Configuration steps:

  1. Create the SASE connector (Netskope, Zscaler, Cloudflare) in Admin > Configure > Connectors

  2. Import/reference the Public Services Catalog in your SASE as a URL Category/Filter

  3. Add Forward-to-Proxy configuration in SASE platform

  4. Install/trust the SurePath AI Root CA on the SASE

  5. Enable X-Authenticated-User header insertion

SASE using Forward-to-Proxy (no TLS intercept at SASE)

The SASE forwards GenAI traffic to the SurePath AI Proxy without performing TLS intercept upstream. Endpoints must trust the SurePath AI Root CA to avoid browser warnings when SurePath AI performs TLS inspection.

Configuration steps:

  1. Create the SASE connector

  2. Import/reference the Public Services Catalog in your SASE

  3. Add Forward-to-Proxy configuration in SASE platform

  4. Deploy the SurePath AI Root CA to endpoints

  5. Enable X-Authenticated-User header insertion

Private portal

Unlike intercepting external AI services, the SurePath AI private portal is always accessed directly. Traffic to and from the portal is always sent through an endpoint's normal traffic routing flows. Using the SurePath AI private portal does not require the SurePath AI root CA nor any special SASE configurations or proxy PAC URL to reach.

Reference configuration documents

SASE

Proxy PAC distribution

Operational notes

Updates to GenAI destinations are handled automatically via the Public Services Catalog and PAC file. SASE deployments may require periodic category list refreshes (per vendor guidance). For pilot deployments, use targeted user/device groups and monitor logs in both your SASE and SurePath AI.

Authentication

In order for SurePath AI to associate AI traffic to specific users, SurePath AI must either prompt a user for credentials before allowing them to reach an AI service or an identifier must be passed to the SurePath AI edge service to associate the traffic to a user without authentication.

SASE

Most SASE vendors' Forward-to-proxy policies support adding the x-authenticated-user (XAU) header to requests forwarded to 3rd party proxy services like SurePath AI. If the XAU header is sent to SurePath AI and the tenant has the requisite SASE connector added and the request comes from a known IP address of that SASE vendor, then SurePath AI will trust the contents of the XAU header and automatically authenticate the request to that user without prompting for the user to authenticate.

Some vendors, like Cloudflare, don't yet support sending the XAU header and as such, XAU authentication is not available. In most cases, org-level identification is still possible, but user-level XAU authentication is not.

Proxy PAC

SurePath AI's proxy PAC URLs provide a primary TLS-based proxy address and HTTP fallback proxy address for systems or applications that don't support TLS proxies. Along with the added security, the TLS-based proxy also allows for the use of user-specific hostnames to help SurePath AI identify which tenant traffic should be assigned to. The Proxy connector has three authentication settings:

  • User

    • Users are always prompted for authentication

    • Native traffic and desktop apps won't function as their traffic can't be redirected to authenticate

    • User Activity events will always be assigned to specific users

  • Connector

    • Users are never prompted for authentication

    • Native traffic and desktop apps are fully functional

    • User Activity events will show the connector as the user rather than the actual user name as the user isn't prompted for authentication

  • User with Connector (Recommended)

    • Users are prompted for authentication when using AI service in web browsers

    • Native traffic and desktop apps are fully functional

    • User activity events will show a mix of user names and the proxy connector

The above all assumes that the SurePath AI TLS proxy is being used. In the cases where the TLS proxy isn't supported, authentication always fallback to User authentication. Connector authentication is enabled via TLS proxy as a TLS connection contains a field called Server Name Indication (SNI). Essentially, this is a field that contains the DNS name of the host that the client is trying to reach. SurePath AI uses this field to associate traffic to a specific tenant when its available. In the case of HTTP proxy traffic, the SNI isn't available so it isn't possible to identify the org which mean SurePath AI must prompt users for authentication for all AI services.

Did this answer your question?