Vulcan Cyber manages the full vulnerability risk lifecycle for all IT assets and cyber surfaces including application, cloud, and traditional infrastructure environments. Vulcan Cyber analyzes, contextualizes, prioritizes, and manages all vulnerability and risk data while efficiently orchestrating remediation campaigns.
Creating an API Token for Vulcan Cyber #
Before configuring the Vulcan Cyber connector in Lucidum, you must first create an API Token. Lucidum will use the API Token to access the Vulcan Cyber API.
To create an API Token in Vulcan Cyber:
-
Login to Vulcan Cyber.
-
Click on your user name at the top right corner
-
Go to Account > API Tokens (OAuth2 Authentication).
-
Specify the following:
-
Name. Name of the token.
-
Expiration Date. The expiration date for the token.
-
-
Click Generate token to generate an OAuth 2 token.
-
Copy and paste the token on your local computer.
Configuring the Connector for Vulcan Cyber #
To configure Lucidum to ingest data from Vulcan Cyber:
-
Log in to Lucidum.
-
In the left pane, click Connector.
-
In the Connector page, click Add Connector.
-
Scroll until you find the Connector you want to configure. Click Connect. The Settings page appears.
-
In the Settings page, enter the following:
-
URLÂ (required): The URL of the Vulcan Cyber API
-
API Token (required) – The Vulcan Cyber API token.
-
-
To test the configuration, click Test.
-
If the connector is configured correctly, Lucidum displays a list of services that are accessible with the connector.
-
If the connector is not configured correctly, Lucidum displays an error message.
-