Overview
This integration enables organizations to redirect all public GenAI traffic to SurePath AI through Netskope's proxy chaining capability (also known as Forward-to-Proxy). Using this method, all GenAI traffic defined by a custom URL category is sent through the Netskope proxy system, which then forwards the traffic to the SurePath AI Proxy before reaching the final destination. This approach provides complete visibility in both Netskope and SurePath AI logging systems, allowing admins to use either platform for troubleshooting or analysis.
Organizations implementing this integration should understand that all users whose traffic matches the configured policy will have their public GenAI access redirected to SurePath AI. These users will be required to authenticate using SSO before gaining access to any GenAI services governed by SurePath AI. For POC or pilot deployments, admins can configure specific criteria in the Netskope Real-time Protection policy to redirect traffic for a subset of users or groups. Most organizations use a user group-based approach during limited deployments and expand the policy to all users for production deployment.
Prerequisites
Before configuring Netskope, admins should ensure the SurePath AI Root CA is distributed to endpoints and gather the necessary configuration information from the SurePath AI platform.
Distribute SurePath AI Root CA to endpoints
SurePath AI recommends that organizations distribute the SurePath AI Root CA to all endpoints as a trusted certificate authority before beginning the Netskope configuration. While the certificate will also be installed in Netskope's trusted CA store during the configuration steps, distributing it directly to endpoints provides additional protection against certificate trust errors.
If any services or domains are exempted from TLS decryption in Netskope's configuration, the SurePath AI certificate will be presented directly to end users when they access those GenAI services. Without the SurePath AI Root CA installed in the endpoint's trusted certificate store, users may receive certificate trust errors or warnings in their browsers or applications. Distributing the certificate to endpoints ensures a seamless user experience regardless of which services are decrypted by Netskope versus which services are decrypted by SurePath AI.
To download and distribute the certificate:
In the Admin UI, click Organization in the CONFIGURE section and select the Integration tab
Select the certificate format appropriate for the endpoint operating systems
Click the DOWNLOAD CERTIFICATE button
Distribute the SurePath AI Root CA using existing certificate deployment mechanisms, such as Group Policy, Mobile Device Management (MDM) platforms, or endpoint management tools
Gather configuration information
Admins must collect several items from the SurePath AI platform that will be used during the Netskope configuration steps. These include the proxy address that Netskope will forward traffic to, the curated list of GenAI sites that defines which domains should be redirected, and the SurePath AI security certificate that will be installed in Netskope's trusted CA store.
SurePath AI proxy address
The SurePath AI proxy address is the hostname that Netskope will use as the destination for forwarded GenAI traffic.
In the Admin UI, click Organization in the CONFIGURE section and select the Integration tab
Copy the proxy URL value and save it for use during the Netskope proxy configuration step
SurePath AI public services catalog
SurePath AI maintains and curates a list of GenAI sites across the public internet, including vendor names and associated risk levels. This list is downloaded in Netskope-specific format and imported into Netskope as a URL list.
In the Admin UI, click Public Services in the GOVERN section
Click the DOWNLOAD CATALOG button
Select Netskope Config from the download format dropdown
Click DOWNLOAD to save the file
The downloaded file will be named similar to surepath-ai-public-services-netskope-YYYY-MM-DD.txt. Admins should not add additional URLs to this file. If there are sites that need to be added to the catalog, the admin should contact their SurePath AI technical representative for guidance on the appropriate approach.
SurePath AI security certificate
The SurePath AI security certificate must be downloaded and installed in Netskope's trusted CA store during the configuration steps. This allows Netskope to trust SurePath AI's TLS inspection and prevents certificate warnings when SurePath AI decrypts and inspects GenAI traffic.
In the Admin UI, click Organization in the CONFIGURE section and select the Integration tab
Select the PEM format (typically required for Netskope)
Click the DOWNLOAD CERTIFICATE button
Netskope configuration steps
The Netskope configuration process involves several distinct steps: creating a URL list containing all GenAI domains from the SurePath AI catalog, organizing that list into a custom URL category for policy application, adding the SurePath AI security certificate to Netskope's trusted certificate store, creating a proxy configuration that points to the SurePath AI proxy address, and finally creating a forwarding policy that redirects matching traffic through the configured proxy.
Access the Netskope admin console
Log in to the Netskope admin console using the organization-specific URL, which typically follows the format
https://<yourorgname>.goskope.com/ns#/dashboard
Create the URL list
The URL list contains all the individual hostnames and domains from the SurePath AI public services catalog. This list will be referenced by the custom URL category in subsequent steps.
Navigate to Policies > URL Lists and click New URL List
Enter a descriptive name—these instructions use SurePathAI as the example name throughout
Click in the URL & IP ADDRESS field
Open the previously downloaded SurePath AI public services file (named similar to
surepath-ai-public-services-netskope-YYYY-MM-DD.txt)Select all hosts and lines in the file and paste them into the field (each host should appear on a separate line)
Click Save
The URL list should now appear in the list of configured URL lists. The number of services listed in the SurePath AI catalog will not match the number of lines in the file. The line count will be higher because some GenAI services require multiple hostnames to capture all relevant traffic.
Create the custom URL category
The custom URL category groups the URL list into a reusable object that can be referenced in Netskope policies. This category defines what traffic should be considered "GenAI traffic" for the purpose of the forwarding policy.
Navigate to Policies > Web > Custom Categories and click New Custom Category
Enter a descriptive name—these instructions use SurePathAI throughout
In the URL List (Include) field, select the URL list created in the previous step (named SurePathAI in these examples)
Click Save
The custom category should now appear in the list of configured custom categories.
Add the SurePath AI security certificate
Installing the SurePath AI root certificate in Netskope's trusted CA store ensures that Netskope will trust SurePath AI's TLS inspection. This prevents certificate warnings from being presented to end users when SurePath AI decrypts and inspects GenAI traffic.
From the Netskope home page, select Settings (this will open in a new window)
Navigate to Manage > Certificates and click New Trusted CA
In the File Name field, enter a descriptive name that will be displayed in the UI—these instructions use SurePathAI throughout
Click SELECT FILE and choose the
.pemcertificate file previously downloaded from SurePath AIClick VALIDATE to verify the certificate
Click SAVE to complete the installation
The certificate should now appear in the list of Trusted CAs.
Create the proxy configuration
The proxy configuration defines the SurePath AI proxy as a forwarding destination that Netskope can send traffic to. The proxy settings include the hostname and port number that Netskope will connect to when forwarding GenAI traffic.
From the Settings page (accessed from the Netskope home page), navigate to Manage > Forward to Proxy Integration and click Setup Proxy
Enter a descriptive name—these instructions use SurePathAI throughout
Set the Host field to the SurePath AI proxy URL value that was copied from the Admin UI in the prerequisites section
Set the Port field to 8080 unless the organization has received specific instructions from SurePath AI to use a different port number
At this point, admins can either save the configuration or continue with the optional X-Authenticated-User configuration described in the next section.
Configure X-Authenticated-User header (Recommended)
Netskope supports inserting the X-Authenticated-User (XAU) header into proxy requests, which passes the end user's username to SurePath AI. This header is required for organizations using SurePath AI Discovery mode. For non-Discovery organizations, the XAU header is optional but recommended because it eliminates the need for users to authenticate when accessing public GenAI services governed by SurePath AI. When the XAU header is present and SurePath AI recognizes the traffic as coming from a trusted Netskope connector, the user's identity is automatically associated with the traffic without requiring an additional authentication prompt. This creates a fully transparent experience for end users.
Under OPTIONS, select the X-Authenticated-User option
Save the settings
Create the forwarding policy
The forwarding policy instructs Netskope to redirect traffic matching the custom URL category to the SurePath AI proxy. This is the policy that actually enables the integration and begins redirecting GenAI traffic.
Navigate to Policies > Real-time Protection and click New Policy > Web Access
Enter a descriptive name—these instructions use SurePathAI throughout
For pilot or POC deployments, configure the Source criteria to limit the policy to specific test users or groups
For production deployments, leave the Source criteria unrestricted to apply the policy to all users
Set the Destination > Category field to the custom category created earlier (named SurePathAI in these examples)
Admins can begin typing "surepath" to locate the category more quickly
Set the Profile & Action > Action field to Forward to Proxy
Set the Profile & Action > Proxy field to the proxy configuration created earlier (named SurePathAI in these examples)
Click SAVE
The policy should now appear in the policy list. Admins should review and adjust the policy order to ensure the SurePath AI forwarding rule is evaluated appropriately within the organization's overall Netskope policy structure. The SurePath AI forwarding policy should typically be positioned before other AI-related policies to ensure GenAI traffic is redirected before other rules can take effect.
Apply the configuration
Click the Apply Changes button that appears on most Netskope configuration screens
This publishes the configuration changes and makes the integration active.
Verification and troubleshooting
After the configuration is applied and deployed to test users or groups, admins can verify the integration using the Ready tool at https://ready.surepath.ai. Users whose traffic is being redirected should see successful validation results for both certificate trust and network configuration. If either test fails, admins should verify that the URL list, custom category, certificate installation, and forwarding policy are all configured correctly and that the policy is being applied to the intended user population.
Both Netskope and SurePath AI maintain logs of GenAI traffic that can be used for troubleshooting. Admins should verify that traffic appears in both systems when users access GenAI services covered by the Public Services catalog.
