Skip to content
Login

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

Lucidum’s cyber beard is thriving! A Rising in Cyber 2025 Honoree! See the wisdom behind the whiskers → [Learn More!]

  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions
    • Modernize Siem Operations
    • Risk Vulnerability/
    • Data Management
    • CISO Tool Kit
  • Product
  • Company
    • About
    • Patents
    • Testimonials
  • Resources
    • E-Books
    • White Papers
    • Videos
    • Blogs
    • Documentation
  • Home
  • Solutions

    Solutions

    • Modernize Sec Ops
    • Risk & Vulnerability
    • Data Management
    • CISO Tool Kit
    • MEGAMENU
  • Product
  • Company

    COMPANY

    • About Us
    • Testimonials
    • MEGAMENU
  • Resources

    Resource Library

    • Documentation
    • White Papers
    • Videos
    • Blogs
    • MEGAMENU

What is Lucidum?

  • Overview of Lucidum
  • Protected: Lucidum’s Machine Learning

Getting Started with Lucidum

  • Introduction to Getting Started with Lucidum
  • First Step: User Accounts and Proxy Server
  • Second Step: Connectors
  • Introduction to Dashboards
  • Use Cases for Dashboard

Proxy Server

  • Introduction to Proxy Server
  • Configuring a Proxy Server
  • Renewing a Proxy Server

Managing Users

  • Introduction to User Management
  • Creating and Managing User Accounts
  • Creating and Managing Roles
  • Enabling SSO
  • User Preferences

Connectors

  • Introduction to Connectors
  • Using Connectors
  • Connectors FAQs
  • List of Connectors
    • List of Connectors
    • 1
      • 1E Tachyon
    • A
      • Abnormal Security
      • Absolute
      • Adaptive Shield
      • Addigy
      • Admin By Request
      • ADP
      • Adobe
      • Adobe Workfront
      • Aha!
      • Airlock
      • Airtable
      • Alcatel-Lucent OmniVista 2500
      • Alcide
      • Alert Logic Cloud Insight
      • AlertSite
      • Appgate Software Defined Perimeter (SDP)
      • Aqua
      • Archer Integrated Risk Management
      • Arista NDR
      • Aruba Central
      • Asana
      • Asset Panda
      • Atera
      • Aternity
      • Atlas Data Center
      • Attivo BOTsink
      • Automox
      • Auvik
      • Aviatrix Enterprise Platform
      • AWS
    • B
      • Barracuda CloudGen Firewall
      • BambooHR
      • Baramundi
      • Barracuda CloudGen Access
      • BeyondTrust BeyondInsight
      • BeyondTrust Endpoint Privilege Management
      • BeyondTrust Password Safe
      • BeyondTrust Privileged Identity
      • BeyondTrust Privilege Management for Windows
      • BigID
      • BigTime Projector
      • Bionic
      • Bitbucket
      • Bitdefender GravityZone
      • bitFit
      • BitSight Security Performance Management
      • BlackBerry Unified Endpoint Management (UEM)
      • Block 64 BlockBox
      • BlueCat Enterprise DNS
      • BlueCat Micetro DNS Management
      • BMC Helix CMDB
      • BMC Helix Discovery
      • BMC TrueSight Presentation Server
      • BMC TrueSight Server Automation
      • Box
      • Broadcom Symantec ProxySG
      • Buildkite
      • Burp Suite
    • C
      • CA Service Management
      • CA Spectrum
      • Cato SASE
      • Canonical Ubuntu Landscape
      • Censys
      • Centrify Identity Services
      • CFEngine
      • ChangeGear
      • Checkmarx SAST (CxSAST)
      • Check Point CloudGuard
      • Check Point Harmony Endpoint
      • Check Point Infinity
      • Check Point Infinity External Risk Management
      • Chef
      • Cherwell Service Management
      • Chorus
      • CIS-CAT Pro
      • Cisco Identity Services Engine (ISE)
      • Cisco Meraki
      • Cisco Secure Endpoint
      • Cisco TACACS
      • Cisco Umbrella
      • Cisco Vulnerability Management
      • Citrix Endpoint Management
      • Claroty
      • CloudConnexa
      • Cloudflare
      • CoalfireOne
      • Code42 Incydr
      • Cohesity
      • ColorTokens Xshield
      • ConnectWise Automate
      • CrowdStrike Falcon Endpoint Protection Platform
      • CrowdStrike Falcon LogScale
      • CSCDomainManager
      • CyberArk Endpoint Privilege Manager (EPM)
      • CyberCNS
      • Cybereason EDR
      • CyCognito
      • Cyera
      • CylancePROTECT
      • Cymulate
      • Cyware
    • D
      • Darktrace PREVENT
      • Databricks
      • Datadog
      • DataLocker SafeConsole
      • Datto Remote Monitoring and Management (RMM)
      • Dayforce
      • DefenseStorm
      • Delinea Privilege Manager
      • Delinea Secret Server
      • Dell Avamar
      • Dell Integrated Dell Remote Access Controller (iDRAC)
      • Dell OpenManage Enterprise
      • Device42
      • DigiCert CertCentral
      • Digital Guardian
      • DivvyCloud
      • DNS Made Easy
      • Docusign
      • Domain Certificate
      • Domotz
      • Dragos
      • Druva Cloud Platform
      • DTEX InTERCEPT
      • Duo Premier
      • Dynatrace
    • E
      • Eclypsium
      • Edgescan
      • EfficientIP SOLIDserver DDI
      • Elastic
      • Endgame
      • Eracent
      • ExtraHop Reveal(x)
      • ExtremeCloud IQ
      • Extreme Networks ExtremeWireless WiNG
      • EZOfficeInventory
    • F
      • F5 BIG-IP iControl
      • F5 BIG-IQ Centralized Management
      • F5 Distributed Cloud App Infrastructure Protection (AIP)
      • FireMon Security Manager
      • Flexera One
      • FlexNet Manager Suite for Cloud
      • Forcepoint Web Security
      • ForgeRock Directory Services
      • FortiClient Enterprise Management Server (FortiClient EMS)
      • FortiEDR
      • Fortify Software Security Center
      • Fortinet FortiGate
      • Fortra Vulnerability Management
      • Forward Networks
      • FreeIPA
      • Freshservice
    • G
      • Gigamon GigaVUE-FM
      • Gigamon ThreatINSIGHT
      • GitHub
      • GitLab
      • GoDaddy
      • Google Chronicle
      • Google Cloud
      • Google Workspace Drive
      • Google Workspace Endpoint Manager
      • Greenbone OpenVAS
      • GreyNoise
      • Guardicore Centra Security Platform
      • GYTPOL
    • H
      • Halcyon Anti-Ransomware
      • HashiCorp Consul
      • HCL BigFix
      • Heimdal
      • Hexagon HxGN EAM
      • HiBob
      • HP Device Manager
      • HPE Integrated Lights-Out (iLO)
      • HPE Intelligent Management Center (IMC)
      • HPE OneView
      • HubSpot
      • HYPR Passwordless
    • I
      • IBM Hardware Management Console (HMC)
      • IBM MaaS360
      • IBM Maximo
      • IBM Security Guardium
      • IBM Security QRadar
      • IBM SevOne Network Performance Management (NPM)
      • IBM Security Randori Recon
      • IBM Tivoli Application Dependency Discovery Manager (TADDM)
      • iboss Zero Trust SASE (Secure Access Service Edge)
      • iCIMS
      • Icinga
      • IGEL Universal Management Suite (UMS)
      • Illumio Core Platform
      • Imperva SecureSphere Database Activity Monitoring (DAM)
      • INAP
      • Infinipoint Zero Trust Workforce Access Platform
      • Infoblox BloxOne DDI
      • Infoblox NetMRI
      • Intezer Protect
      • Intel Data Center Manager (DCM)
      • IP Fabric
      • Island Enterprise Browser
      • IT Glue
      • iTop
      • Ivanti Connect Secure
      • Ivanti Endpoint Security
      • Ivanti Neurons for Modern Device Management (MDM)
      • Ivanti Neurons for RBVM
      • Ivanti Security Controls
      • Ivanti Unified Endpoint Manager
    • J
      • Jamf Security Cloud
      • Jamf Pro
      • Jamf Protect
      • JetPatch
      • JFrog Artifactory
      • Jira Cloud Platform
      • JumpCloud
      • Juniper Junos
      • Juniper Junos Space
    • K
      • Kandji
      • Kaseya VSA
      • Kaspersky Security Center
      • Keycloak
      • KnowBe4
      • Kolide K2
    • L
      • Lacework
      • Lakeside Systrack
      • Lansweeper
      • LastPass
      • LaunchDarkly
      • LibreNMS
      • LimaCharlie
      • LinkedIn Sales Navigator
      • Litmos
      • LogicMonitor
      • LogMeIn Central
      • LogRhythm SIEM
      • Lookout Mobile EDR
      • Lucidchart
    • M
      • MalwareBytes
      • ManageEngine Endpoint Center
      • ManageEngine OpManager
      • ManageEngine OpUtils
      • ManageEngine ServiceDesk Plus
      • McAfee MVision Cloud
      • Medigate
      • Mice&Men DNS Management
      • Microsoft Active Directory
      • Microsoft Azure
      • Microsoft Configuration Manager
      • Microsoft Defender for Cloud Apps
      • Microsoft Defender
      • Microsoft Intune
      • Microsoft Lync
      • Microsoft Sentinel
      • Microsoft SharePoint
      • Microsoft System Center Virtual Machine Manager (SCVMM)
      • Monday.com
      • Mosyle
    • N
      • N-able
      • Nagios Core
      • Nagios XI
      • Nasuni
      • Nectus
      • NetApp ONTAP
      • NetBox
      • NetBrain
      • Netdisco
      • Netskope
      • NetSpyGlass
      • Netwrix Privilege Secure
      • New Relic
      • Nexthink Infinity
      • ngrok
      • NinjaOne
      • Nozomi Guardian
      • Nucleus
      • Nutanix AHV
    • O
      • Observium
      • Obsidian Security
      • Okta LDAP
      • Okta SSO
      • Omnissa Horizon 8
      • OnDMARC
      • OneLogin
      • Oomnitza
      • openDCIM
      • OpenLDAP
      • OpenStack
      • OpenText GroupWise
      • OpenText NetIQ Advanced Authentication
      • OpenText NetIQ Identity Manager
      • OpenText Network Node Manager i
      • OpenText Server Automation
      • OpenText SiteScope
      • OpenText Webroot Business Endpoint Protection
      • Opsgenie
      • OpsRamp
      • Opsview
      • OPSWAT MetaDefender IT Access
      • Oracle Cloud Infrastructure
      • Orca Cloud Visibility Platform
      • Oracle Communications Unified Assurance (OCUA)
      • Outpost24 Sweepatic EASM
      • oVirt
      • OX Security
    • P
      • PacketFence
      • PagerDuty
      • Palo Alto Networks Cortex XDR
      • Palo Alto Networks Cortex Xpanse
      • Palo Alto Networks IoT Security
      • Palo Alto Networks Panorama
      • Palo Alto Networks PAN‑OS
      • Palo Alto Networks Prisma Cloud Compute Edition
      • Palo Alto Networks Prisma Cloud CSPM
      • Palo Alto Networks Prisma Cloud CWP
      • Panorays
      • PaperCut
      • Parallels
      • phpIPAM
      • Ping Identity
      • PingOne
      • PK Protect Data Protection Platform
      • PluralSight
      • Portnox Cloud
      • Pritunl
      • PrivX
      • Promisec
      • Proofpoint Identity Threat Defense
      • Proofpoint Insider Threat Management
      • Proofpoint Targeted Attack Protection (TAP)
      • Proofpoint Zero Trust Network Access (ZTNA)
      • Proxmox Virtual Environment (VE)
      • PRTG Network Monitor
      • Pulseway Remote Monitoring and Management (RMM)
      • Pulumi
      • Puppet
      • Pure Storage Pure1
    • Q
      • Qualys Cloud Platform (VM/PC)
      • Qualys Global AssetView
      • Quest KACE Endpoint Systems Management Appliance
      • Quip
    • R
      • Rancher
      • Rapid7 InsightAppSec
      • Rapid7 InsightCloudSec
      • Rapid7 InsightIDR
      • Rapid7 InsightVM (Cloud)
      • Rapid7 InsightVM
      • Rapid7 Nexpose Warehouse
      • RapidFort
      • Red Canary
      • Red Hat Ansible Automation Platform
      • Red Hat Identity Management (IdM)
      • Red Hat OpenShift
      • RedSeal
      • ReliaQuest GreyMatter Digital Risk Protection (DRP)
      • Ring Central
      • RiskIQ Illuminate
      • Riverbed SteelCentral Controller
      • Rubrik
      • runZero Network Discovery
    • S
      • Sage People
      • SailPoint IdentityIQ
      • SailPoint IdentityNow
      • Sal Endpoint Management
      • Salesforce
      • Salesforce ExtremeCloud IQ – Site Engine (XIQ-SE)
      • Salesloft
      • Samsung Knox
      • SAP Concur
      • Saviynt Enterprise Identity Cloud (EIC)
      • Scale Computing HyperCore
      • Schneider Electric EcoStruxure IT
      • ScienceLogic
      • ScopNET
      • Sectigo Certificate Manager (SCM)
      • SecureW2 JoinNow MultiOS
      • Secureworks Taegis VDR
      • Secureworks Taegis XDR
      • SecurityScorecard
      • Sensu Go
      • SentinelOne Singularity Network Discovery
      • SentinelOne Singularity XDR
      • Sentry
      • Server Message Block
      • ServiceNow
      • SFTPGo
      • Shodan
      • Signal Sciences
      • SimpleMDM
      • Site24x7
      • Skybox Firewall Assurance
      • Slack
      • Smartsheet
      • Snipe-IT
      • Snow Software
      • Snyk
      • SolarWinds
      • Sonatype IQ Server
      • SonicWall Network Security Manager
      • SonicWall SonicOS
      • Sophos Central
      • Sophos Endpoint Protection
      • SOTI MobiControl
      • Spacewalk
      • Specops Inventory
      • Spiceworks
      • Splunk
      • StatusCake
      • Sumo Logic
      • Sunbird dcTrack
      • Symantec Cloud Workload Protection (CWP)
      • Symantec Control Compliance Suite (CCS)
      • Symantec Data Loss Prevention (DLP)
      • Symantec Endpoint Management Suite
      • Symantec Endpoint Protection
      • Syxsense Secure
    • T
      • Tableau
      • Tailscale
      • Tanium Discover
      • TCPWave DDI
      • TeamViewer Remote Management
      • Tenable Cloud Security
      • Tenable Nessus
      • Tenable OT Security
      • Tenable Security Center
      • Tenable Vulnerability Management
      • Teqtivity
      • Thinkst Canary
      • ThreatConnect
      • TOPdesk Enterprise Service Management (ESM)
      • Torii
      • Trellix Endpoint Security (HX)
      • Trellix ePolicy Orchestrator
      • Trend Micro Cloud App Security
      • Trend Micro Vision One
      • Trend Micro Worry-Free Services
      • Tufin SecureTrack+
    • U
      • UKG Pro
      • UniFi Controller
      • Universal SSH Key Manager
      • UpGuard Vendor Risk
      • Uptycs
    • V
      • Vectra AI
      • Veeam Backup & Replication
      • Venafi Trust Protection Platform
      • Veracode
      • Vercara UltraDNS
      • VMware Carbon Black Cloud Audit and Remediation
      • VMware Carbon Black Cloud Workload
      • VMware Carbon Black Endpoint
      • VMware Tanzu Application Service (TAS)
      • VMware vCloud Director (VCD)
      • VMware Virtualization Platform
      • VMware vRealize
      • VMware vRealize Automation SaltStack Config
      • VMware Workspace ONE
      • Vulcan Cyber
    • W
      • Wasp AssetCloud
      • Wazuh
      • WhatsUp Gold
      • WithSecure Elements Endpoint Protection
      • Wiz
      • Workday
    • X
      • Xton Access Manager
    • Z
      • Zscaler Private Access
      • Zscaler Internet Access
      • Zabbix
      • Zenoss Cloud
      • ZeroFox
      • Zerto
      • Zoom
      • Zscaler Deception
      • Zscaler Client Connector

Viewing Data

  • Introduction to Viewing Data in Lucidum
  • Viewing Data About All Assets, All Users, and All Vulnerabilities
  • Protected: Viewing Details about Individual Assets, Users, or Vulnerabilities
  • Protected: Viewing Details About Data Sources for Assets and Users

Using Queries

  • Queries and Data
  • Creating Queries
  • Saved Queries and Historical Queries
  • Using Queries with Nested Lists
  • Protected: Appendix: Fields and Regular Expressions
  • Appendix: Data Types and Operators

Dashboards

  • Overview of Dashboards
  • Channels
  • Viewing a Dashboard
  • Viewing Charts
  • Creating a Dashboard
  • Creating a Chart
  • Managing a Dashboard
  • Managing Charts
  • Exporting and Importing a Dashboard

Value-Oriented Dashboards (VODs)

  • Overview of Value-Oriented Dashboards
  • Protected: Cloud Dashboards
  • Identity Dashboards
  • Inventory Dashboards
  • Security & IT Ops Dashboards
  • Protected: Threat Intelligence Dashboards

Streamlining Queries with SmartLabels and Tags

  • Protected: Introduction to Tags and Smart Labels
  • Protected: Overview of Tags
  • Protected: Migrating Custom Fields to Tags
  • Protected: Creating and Managing Tags
  • Protected: Overview of SmartLabels
  • Protected: Migrating Dynamic Fields to SmartLabels
  • Protected: Creating and Managing SmartLabels
  • Protected: Using Functions in SmartLabels
  • Protected: Examples for Tags and SmartLabels

Value-Oriented SmartLabels (VOSLs)

  • Protected: Overview of Value-Oriented SmartLabels
  • Protected: Using Value-Oriented SmartLabels

MetaBlocks

  • Introduction
  • Creating and Managing MetaBlocks

Actions

  • Overview of Actions and Actions Workflows
  • List of Actions
    • List of Actions
    • A
      • Active Directory Actions
      • Atera Actions
      • Automox Actions
      • AWS Actions
    • B
      • Barracuda Actions
      • BigPanda Actions
      • BitSight Actions
      • BMC Helix CMDB Actions
    • C
      • Checkmarx Actions
      • Check Point Infinity Actions
      • Cisco AppDynamics Actions
      • Cisco Vulnerability Management (formerly Kenna VM) Actions
      • Commvault Actions
      • Connectwise Automate Actions
      • CrowdStrike Falcon Endpoint Protection Actions
      • Crowdstrike Falcon LogScale Actions
      • CyberArk Actions
      • Cybereason Actions
      • Cyderes Actions
    • D
      • Darktrace Actions
      • Databricks Actions
      • Datadog Actions
      • Delinea Actions
      • Delinea Secret Server Actions
      • Digital Defense Fortra Vulnerability Manager (formerly Frontline VM) Actions
      • Dynatrace Actions
    • E
      • Elastic Cloud Actions
      • Email Actions
      • Exabeam Actions
    • F
      • F5 BIG-IQ Centralized Management Actions
      • F5 Distributed Cloud App Infrastructure Protection (AIP) (formerly F5 Threat Stack) Actions
      • Forescout Actions
      • Fortinet FortiGate Actions
      • Fortra HelpSystems Actions
      • Freshworks Actions
    • G
      • Google Chronicle Actions
      • Google Security Operations Actions
    • H
      • Halo Service Solutions Actions
      • HappyFox Actions
      • Heimdal Security Actions
      • Hunters Actions
    • I
      • IBM QRadar Actions
      • Imperva Actions
      • Infoblox Actions
      • Ivanti Endpoint Security Actions
      • Ivanti Security Controls Actions
      • Ivanti Unified Endpoint Manager Actions
    • J
      • Jira Cloud Actions
      • JumpCloud Actions
    • K
      • Kaspersky Security Center Actions
      • KnowBe4 Actions
    • L
      • LogicMonitor Actions
      • LogRhythm Actions
    • M
      • ManageEngine Endpoint Center Actions
      • ManageEngine ServiceDesk Plus Actions
      • Microsoft Azure Monitor Actions
      • Microsoft Defender Actions
      • Microsoft Sentinel Actions
      • Microsoft System Center Service Manager Actions
      • Microsoft Teams Actions
      • Moogsoft Actions
    • N
      • New Relic Actions
    • O
      • Okta Actions
      • One Identity Actions
      • OpenTelemetry Action
      • Opsgenie Actions
      • Optiv Actions
      • Orca Cloud Visibility Platform Actions
    • P
      • Pager Duty Actions
      • Palo Alto Networks Cortex XDR Actions
      • Palo Alto Networks Panorama Actions
      • Proofpoint SIEM Actions
    • Q
      • Qualys Cloud Platform Actions
      • Qualys Global AssetView Actions
    • R
      • Rackspace Cloud Actions
      • Rapid7 Actions
      • Recorded Future Actions
      • RiskIQ Illuminate Actions
    • S
      • Salesforce Actions
      • ScienceLogic Actions
      • Secureworks Taegis XDR Actions
      • SentinelOne Singularity XDR Actions
      • ServiceNow Actions
      • Slack Actions
      • Snowflake Actions
      • SolarWinds Actions
      • Sophos Central Actions
      • Splunk Actions
      • Sumo Logic Actions
      • SysAid Actions
    • T
      • Tanium Discover Actions
      • Telos Actions
      • Tenable Vulnerability Management Actions
      • ThreatConnect Actions
      • ThreatQuotient Actions
      • TOPdesk Enterprise Service Management (ESM) Actions
      • Trellix Actions
      • Trellix ePolicy Orchestrator Actions
      • Trend Micro Cloud App Security Actions
      • Trend Micro Vision One Actions
      • Trustwave MailMarshal Actions
    • W
      • Webhook Actions
      • Webroot Business Endpoint Protection Actions
      • Wiz Actions
    • Z
      • ZeroFox Actions

Risk

  • Protected: Introduction to Risk
  • Protected: Risk Measurements

Use Cases

  • Protected: Overview of Use Cases
  • Full Inventory of Assets and Users
  • Full Inventory of Assets for Providers
  • Assets with End-of-Life Operating Systems
  • AWS Security Groups
  • Azure Lift and Shift
  • Binding Operational Directives
  • Certificates About to Expire or Already Expired
  • Cloud Resources and Cost
  • How Secure Are Your Assets?
  • Identity and Access Management
  • Lucidum and Cyber Insurance Requirements
  • Protected: Lucidum Normalization
  • Microsoft Defender Missing
  • Microsoft Sentinel Missing
  • Sending Lucidum Data to Microsoft Sentinel
  • Unencrypted Storage
  • Zero-Day Vulnerabilities
  • Zero-Day Vulnerabilities and CVEs
  • Zombie Users and Improper Offboardings
  • Cybersecurity Regulations for the Kingdom of Saudi Arabia
    • Protected: Overview of Cybersecurity Controls
    • Asset Management
    • Business Continuity and Disaster Recovery
    • Cloud Security
    • Compliance
    • Configuration Management
    • Continuous Monitoring
    • Data Classification and Handling
    • Endpoint Security
    • Identification and Authentication
    • Protected: Incident Response
    • Protected: Threat Management

Running Headless with Webhooks

  • Overview of Webhooks
  • Creating a Webhook Configuration
  • Creating Queries
  • Creating a Webhook Action
  • Use Case: Sumo Logic

Lucidum API v1

  • Introduction
  • Tokens, Response Codes, Pagination, Methods, Caveats
  • Authentication
  • Endpoints
  • Protected: Examples

Lucidum API v2

  • Overview of Lucidum API v2
  • Authentication in API v2
  • Protected: Endpoints for Assets and Users
  • Endpoints for Assets and Users with LDG Data Only
  • Endpoints for Change Management
  • Endpoints for System Metrics
  • Endpoints for Connectors and Connector Profiles
  • Endpoints for Data Ingestion
  • Pagination
  • Response Codes
  • Operators and Data Types
  • Protected: Examples for Lucidum API v2

Managing Your Lucidum System

  • Introduction to Managing Your Lucidum System
  • Data Scheduler
  • License Settings
  • Notifications
  • System Settings
  • Theme Management

Lucidum MoM (Manager of Managers)

  • Using MoM

Sending Alerts to Slack

  • Introduction
  • Installing and Configuring the Lucidum App
  • Using the Lucidum App

Using the Luci Chatbot

  • Using the Luci Chatbot

Videos

  • AWS Connector Videos
  • Slack Actions Video
View Categories
  • Home
  • Docs
  • Lucidum API v2
  • Endpoints for Connectors and Connector Profiles

Endpoints for Connectors and Connector Profiles

Estimated Reading Time: 21 min read

You can use the Lucidum API to:

  • Retrieve a list of connectors and the bridge name, display name, description, group, and status of each connector

  • Retrieve configuration details about a single connector, including bridge name, display name, description, group, status, and additional configuration data

  • Create a connector profile

  • Retrieve details about all connector profiles, including the bridge name, display name, profile name, description, and configuration data

  • Retrieve details about a single connector profile, including the bridge name, display name, profile name, description, and configuration data

  • Delete a connector profile, using the DELETE method to remove a connector profile

  • Test a connector

  • Retrieve the test results for a connector, including the test status and the status of each service

  • Enable or disable a service within a connector, for a specific profile

The following sections describe the endpoints for these actions.

Headers #

Requests to the endpoints in the Lucidum API v2 must also include a header with:

  • Content-Type of JSON.

  • bearer Token we generated in the Edit User page.

Retrieve the List of Connectors: /CMDB/v2/connector #

This endpoint queries Lucidum for the list of all connectors. This endpoint returns:

  • an entry for each connector

  • the bridge name (connector name), display name, description, group, and status of each connector

Endpoint

Method

Parameters in URL

/CMDB/v2/connector

GET

  • None

Example cURL Request #

curl --location 'https://test.dev.luciduminc.net/CMDB/v2/connector/' \
--header 'Content-Type: application/json' \
--header 'Authorization: Bearer **********'

  • Line 1. The cURL call. The method defaults to GET. The URL is host name plus the endpoint for the connector API.

  • Line 2. The header specifies to return results in JSON.

  • Line 3. The header specifies to use a Bearer Token for authentication and provides the bearer token.

Example Response #

The response includes thousands of lines. Here is an abbreviated response that shows the first three connector records:

{
    “connectors”: [
        {
            “connector_name”: “api”,
            “bridge_name”: “ad_ldap”,
            “display_name”: “Microsoft Active Directory (AD)”,
            “description”: “Microsoft Active Directory (AD) provides a single point of control for managing users, computers, groups, and other resources on a network. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information.”,
            “group”: “Identity Access Management”,
            “status”: “available”
        },
        {
            “connector_name”: “api”,
            “bridge_name”: “addigy”,
            “display_name”: “Addigy”,
            “description”: “Addigy is a cloud-based, multi-tenant mobile device management solution that manages macOS, iOS, iPadOS, and iOS devices.”,
            “group”: “Asset Management”,
            “status”: “available”
        },
        {
            “connector_name”: “api”,
            “bridge_name”: “artifactory”,
            “display_name”: “Artifactory”,
            “description”: “JFrog Artifactory is a universal DevOps solution providing end-to-end automation and management of binaries and artifacts through the application delivery process that improves productivity across your development ecosystem.”,
            “group”: “Code Management”,
            “status”: “available”
        },

Retrieve Configuration Details About a Single Connector: /CMDB/v2/connector/config #

This endpoint queries Lucidum for configuration details about a single connector. This endpoint returns:

  • an entry for each connector

  • the bridge name (connector name), display name, description, group, and status of each connector

  • the configured fields for the connector

    NOTE: Credentials are not returned in the API.

Endpoint

Method

Parameters in URL

/CMDB/v2/connector/config

GET

  • connector_name=api
  • bridge_name=<bridge name of connector>
NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

Example cURL Request #

curl --location 'https://test.dev.luciduminc.net/CMDB/v2/connector/config?connector_name=api&bridge_name=datadog' \
--header 'Content-Type: application/json' \
-header 'Authorization: Bearer **********'
  • Line 1. The cURL call. If no method is specified, the method defaults to GET. The URL is host name plus the endpoint for the connector API.

  • Line 1. The “?” (question mark) character specifies that all the text to the right of the character is a parameter.

  • Line 1. connector_name=api is required. This parameter is identical for all connectors.

  • Line 1. The “&” (ampersand) character specifies that the test to the right of the character is an additional parameter.

  • Line 1. bridge_name=datadog. This parameter specifies the connector to retrieve configuration information for.

    NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

  • Line 2. The header specifies to return results in JSON.

  • Line 3. The header specifies to use a Bearer Token for authentication and provides the bearer token.

Example Response #

The response looks like this:

NOTE: Credentials are not returned in the API.

{
    “connector_name”: “api”,
    “bridge_name”: “datadog”,
    “display_name”: “Datadog Enterprise”,
    “description”: “Datadog allows observability for cloud-scale applications, providing monitoring of servers, databases, tools, and services, through a SaaS-based data analytics platform.”,
    “group”: “Monitoring”,
    “status”: “available”,
    “config”: {
        “url”: “https://api.datadoghq.com”,
        “app_key”: “”,
        “api_key”: “”,
        “verify_ssl”: false,
        “field_metadata”: {
            “app_key”: “encrypt;required”,
            “api_key”: “encrypt;required”
        },
        “field_display”: {
            “url”: {
                “display_name”: “URL”,
                “description”: “The URL of the Datadog API, default value is https://api.datadoghq.com”
            },
            “app_key”: {
                “display_name”: “App Key”,
                “description”: “Datadog application key”
            },
            “api_key”: {
                “display_name”: “API Key”,
                “description”: “Datadog API key”
            },
            “verify_ssl”: {
                “display_name”: “Verify SSL”,
                “description”: “Toggle on/off validation of SSL certificate”
            }
        }
    }
}

Create a Profile for a Connector: /CMDB/v2/connector/profile #

This endpoint creates a new profile for a connector. You must test the profile after creation. This endpoint creates but does not test the new profile.

NOTE: Certain connectors, like the Google Cloud Platform connector or the ADP connector, require you to upload a file when creating a profile. You cannot create profiles for these connectors with API v2.

Method

Parameters in URL

/CMDB/v2/connector/profile

POST

  • connector_name: api
  • bridge_name: <bridge name of connector>
  • profile_name: <name for new profile>
  • url: <url for the connector third-party API>
  • fields required by config.field_metadata

To determine the field required by config.field_metadata:

Retrieve data from the endpoint /CMDB/v2/connector/config?connector_name=api&bridge_name=<bridge name for connector>.

NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

Finding config.field_metadata #

To find the config.field_metadata fields to create a profile, you need to look at the configuration information for the connector.

For example, for the Datadog connector, call the endpoint /CMDB/v2/connector/config?connector_name=api&bridge_name=datadog

The results look like this:

{
    “connector_name”: “api”,
    “bridge_name”: “datadog”,
    “display_name”: “Datadog Enterprise”,
    “description”: “Datadog allows observability for cloud-scale applications, providing monitoring of servers, databases, tools, and services, through a SaaS-based data analytics platform.”,
    “group”: “Monitoring”,
    “status”: “available”,
    “config”: {
        “url”: “https://api.datadoghq.com”,
        “app_key”: “”,
        “api_key”: “”,
        “verify_ssl”: false,
        “field_metadata”: {
            “app_key”: “encrypt;required”,
            “api_key”: “encrypt;required”
      },
        “field_display”: {
            “url”: {
                “display_name”: “URL”,
                “description”: “The URL of the Datadog API, default value is https://api.datadoghq.com”
            },
            “app_key”: {
                “display_name”: “App Key”,
                “description”: “Datadog application key”
            },
            “api_key”: {
                “display_name”: “API Key”,
                “description”: “Datadog API key”
            },
            “verify_ssl”: {
                “display_name”: “Verify SSL”,
                “description”: “Toggle on/off validation of SSL certificate”
            }
        }
    }
}
  • Under the config section, find the section called field_metadata.

  • Note that the app_key and api_key fields are noted as required.

  • This means that you must include these two fields when creating a profile for the Datadog connector.

Example cURL Request #

curl --request POST --location 'https://test.dev.luciduminc.net/CMDB/v2/connector/profile' \
--header 'Content-Type: application/json' \
--header 'Authorization: Bearer **********' \
--data '{
"connector_name": "api",
"bridge_name": "datadog",
"profile_name": "customer_support",
"url": "https://api.datadoghq.com",
"app_key": "123456789011",
"api_key": "109876543210",
}'
  • Line 1. The cURL call. We specified “–request POST” so we can send data to Lucidum. The URL is host name plus the endpoint for the connector API.

  • Line 1. The The “\” (backslash) at the end of a line indicates to continue the cURL command on the next line and process all the lines as a single request.

  • Line 2. The header specifies to return results in JSON.

  • Line 3. The header specifies to use a Bearer Token for authentication and provides the bearer token.

  • Line 4. The data to send to Lucidum.

  • Line 5. “connector_name”: “api”  is required. This parameter is identical for all connectors.

  • Line 6. “bridge_name”: “datadog” This parameter specifies the connector to create a profile for.

    NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

  • Line 7.  “profile_name”: “customer_support”. The name of the new profile.
  • Line 8. “url”: “https://api.datadoghq.com”. The optional URL for the Datadog API.

  • Line 9. “app_key”: “123456789011“. The required app_key for the Datadog profile.

  • Line 10. “api_key”: “109876543210“. The required api_key for the Datadog profile.

Example Response #

The response looks like this:

{
    “url”: “https://api.datadoghq.com”,
    “app_key”: “**************************”,
    “api_key”: “**************************”,
    “field_metadata”: {
        “app_key”: “encrypt;required”,
        “api_key”: “encrypt;required”
    },
    “field_display”: {
        “url”: {
            “display_name”: “URL”,
            “description”: “The URL of the Datadog API, default value is https://api.datadoghq.com”
        },
        “app_key”: {
            “display_name”: “App Key”,
            “description”: “Datadog application key”
        },
        “api_key”: {
            “display_name”: “API Key”,
            “description”: “Datadog API key”
        },
        “verify_ssl”: {
            “display_name”: “Verify SSL”,
            “description”: “Toggle on/off validation of SSL certificate”
        }
    },
    “active”: true,
    “description”: “Datadog allows observability for cloud-scale applications, providing monitoring of servers, databases, tools, and services, through a SaaS-based data analytics platform.”,
    “display_name”: “Datadog Enterprise”,
    “status”: “available”,
    “group”: “Monitoring”,
    “connector_name”: “api”,
    “bridge_name”: “datadog”,
    “profile_name”: “customer_support”,
    “modified_time”: “2024-09-24T14:59:42.476652Z”,
    “services_list”: [
        {
            “platform”: “api”,
            “type”: “user_info”,
            “display_name”: “Datadog User”,
            “service”: “datadog_user”,
            “activity”: true,
            “status”: “FAIL”,
            “message”: “not tested”
        },
        {
            “platform”: “api”,
            “type”: “asset_info”,
            “display_name”: “Datadog Host”,
            “service”: “datadog_host”,
            “activity”: true,
            “status”: “FAIL”,
            “message”: “not tested”
        },
        {
            “platform”: “api”,
            “type”: “asset_info”,
            “display_name”: “Datadog Container”,
            “service”: “datadog_container”,
            “activity”: true,
            “status”: “FAIL”,
            “message”: “not tested”
        }
    ],
    “profile_id”: “66f2d3de9cb7671a2c4b0c75”
}

Retrieve the List of Profiles for All Connectors: /CMDB/v2/connector/profile #

This endpoint queries Lucidum for the list of all profiles for all connectors. This endpoint returns:

  • an entry for each connector

  • the bridge name (connector name), display name, description, group, and status of each connector

Endpoint

Method

Parameters in URL

/CMDB/v2/connector/profile

GET

  • None

Example cURL Request #

curl --location 'https://test.dev.luciduminc.net/CMDB/v2/connector/profile' \
--header 'Content-Type: application/json' \
--header 'Authorization: Bearer **********'
  • Line 1. The cURL call. If no method is specified, the method defaults to GET. The URL is host name plus the endpoint for the connector API.

  • Line 2. The header specifies to return results in JSON.

  • Line 3. The header specifies to use a Bearer Token for authentication and provides the bearer token.

Example Response #

The response includes thousands of lines. Here is an abbreviated response that shows a single connector profile:

{
    “connectorProfiles”: [
        {
            “app_id”: “***************************”,
            “app_secret”: “***************************”,
            “tenant_id”: “***************************”,
            “url”: “https://fef.amsua0602.manage.microsoft.com/ReportingService/DataWarehouseFEService/”,
            “field_metadata”: {
                “app_id”: “required”,
                “app_secret”: “encrypt;required”,
                “tenant_id”: “required”,
                “url”: “required”
            },
            “field_display”: {
                “url”: {
                    “display_name”: “URL”,
                    “description”: “Microsoft intune URL. For example, https://<intune subdomain>.manage.microsoft.com/ReportingService/DataWarehouseFEService/”
                },
                “app_id”: {
                    “display_name”: “Client ID”,
                    “description”: “Client ID for the application”
                },
                “app_secret”: {
                    “display_name”: “Client secret”,
                    “description”: “Client secret for the application”
                },
                “tenant_id”: {
                    “display_name”: “Tenant ID”,
                    “description”: “Microsoft Azure tenant ID”
                }
            },
            “status”: “available”,
            “bridge_name”: “intune”,
            “connector_name”: “api”,
            “display_name”: “Microsoft Intune”,
            “description”: “Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).”,
            “active”: true,
            “profile_name”: “Default profile”,
            “services_list”: [
                {
                    “connection”: “intune”,
                    “connector”: “api”,
                    “service”: “intune_device”,
                    “status”: “OK”,
                    “activity”: true
                },
                {
                    “connection”: “intune”,
                    “connector”: “api”,
                    “service”: “intune_user”,
                    “status”: “OK”,
                    “activity”: true
                }
            ],
            “profile_id”: “62268b697ad01232db4bc3a7”
        },

Retrieve a Single Profile for a Single Connector: /CMDB/v2/connector/profile #

This endpoint queries Lucidum for details about a single profile for a single connector.

Endpoint

Method

Parameters in URL

/CMDB/v2/connector/profile

GET

  • connector_name=api
  • bridge_name=<bridge name of connector>
  • profile_name=<profile name>

NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.</0>

NOTE: To find the profile_name for a connector, you can use the /CMDB/v2/connector/profile endpoint and search the results for the profile you are interested in.

Example cURL Request #

curl --location 'https://test.dev.luciduminc.net/CMDB/v2/connector/profile?connector_name=api&bridge_name=datadog&profile_name=api profile 1' \
--header 'Content-Type: application/json' \
-header 'Authorization: Bearer **********'
  • Line 1. The cURL call. If no method is specified, the method defaults to GET. The URL is host name plus the endpoint for the connector API.

  • Line 1. The “?” (question mark) character specifies that all the text to the right of the character is a parameter.

  • Line 1. connector_name=api is required. This parameter is identical for all connectors.

  • Line 1. The “&” (ampersand) character specifies that the test to the right of the character is an additional parameter.

  • Line 1. bridge_name=datadog. This parameter specifies the connector to retrieve information from.

    NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

  • Line 1. profile_name=api profile 1. This parameter specifies the profile to retrieve information from.

    NOTE: To find the profile_name for a connector, you can use the /CMDB/v2/connector/profile endpoint and search the results for the profile you are interested in.

  • Line 2. The header specifies to return results in JSON.

  • Line 3. The header specifies to use a Bearer Token for authentication and provides the bearer token.

Example Response #

{
    “connectorProfiles”: [
        {
            “url”: “https://api.datadoghq.com”,
            “app_key”: “abcdefghiklmnopqrstuvwxya”,
            “api_key”: 12345678910111213″,
            “verify_ssl”: false,
            “field_metadata”: {
                “app_key”: “encrypt;required”,
                “api_key”: “encrypt;required”
            },
            “field_display”: {
                “url”: {
                    “display_name”: “URL”,
                    “description”: “The URL of the Datadog API, default value is https://api.datadoghq.com”
                },
                “app_key”: {
                    “display_name”: “App Key”,
                    “description”: “Datadog application key”
                },
                “api_key”: {
                    “display_name”: “API Key”,
                    “description”: “Datadog API key”
                },
                “verify_ssl”: {
                    “display_name”: “Verify SSL”,
                    “description”: “Toggle on/off validation of SSL certificate”
                }
            },
            “active”: true,
            “description”: “Datadog allows observability for cloud-scale applications, providing monitoring of servers, databases, tools, and services, through a SaaS-based data analytics platform.”,
            “display_name”: “Datadog Enterprise”,
            “status”: “available”,
            “group”: “Monitoring”,
            “connector_name”: “api”,
            “bridge_name”: “datadog”,
            “profile_name”: “api profile 1”,
            “modified_time”: “2024-09-03T15:42:32.778+00:00”,
            “services_list”: [
                {
                    “platform”: “api”,
                    “type”: “user_info”,
                    “display_name”: “Datadog User”,
                    “service”: “datadog_user”,
                    “activity”: true,
                    “status”: “OK”,
                    “message”: “success”
                },
                {
                    “platform”: “api”,
                    “type”: “asset_info”,
                    “display_name”: “Datadog Host”,
                    “service”: “datadog_host”,
                    “activity”: true,
                    “status”: “OK”,
                    “message”: “success”
                },
                {
                    “platform”: “api”,
                    “type”: “asset_info”,
                    “display_name”: “Datadog Container”,
                    “service”: “datadog_container”,
                    “activity”: true,
                    “status”: “OK”,
                    “message”: “success”
                }
            ],
            “profile_id”: “66d72e68ccb4dc5bc98c286e”
        }
    ]
}

Delete a Single Profile for a Single Connector: /CMDB/v2/connector/profile #

This endpoint deletes a single profile for a single connector.

Endpoint

Method

Parameters in URL

/CMDB/v2/connector/profile

DELETE

  • connector_name=api
  • bridge_name=<bridge name of connector>
  • profile_name=<profile name>

NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

NOTE: To find the profile_name for a connector, you can use the /CMDB/v2/connector/profile endpoint and search the results for the profile you are interested in.

Example cURL Request #

curl --request DELETE --location 'https://test.dev.luciduminc.net/CMDB/v2/connector/profile?connector_name=api&bridge_name=datadog&profile_name=api profile 1' \
--header 'Content-Type: application/json' \
-header 'Authorization: Bearer **********'
  • Line 1. The cURL call. We specified “–request DELETE ” so we can delete a profile. The URL is host name plus the endpoint for the connector API.

  • Line 1. The “?” (question mark) character specifies that all the text to the right of the character is a parameter.

  • Line 1. connector_name=api is required. This parameter is identical for all connectors.

  • Line 1. The “&” (ampersand) character specifies that the test to the right of the character is an additional parameter.

  • Line 1. bridge_name=datadog. This parameter specifies the connector to delete information from.

    NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

  • Line 1. profile_name=api profile 1. This parameter specifies the profile to delete.

    NOTE: To find the profile_name for a connector, you can use the /CMDB/v2/connector/profile endpoint and search the results for the profile you are interested in.

  • Line 2. The header specifies to return results in JSON.

  • Line 3. The header specifies to use a Bearer Token for authentication and provides the bearer token.

Example Response #

{
    “removed”: true
}

Test a Connector: /CMDB/v2/connector/test/async #

This endpoint tests a single connector using a single profile.

Method

Parameters in URL

/CMDB/v2/connector/test/async

POST

  • connector_name: api
  • bridge_name: <bridge name of connector>
  • profile_name: <name for new profile>

NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

NOTE: To find the profile_name for a connector, you can use the /CMDB/v2/connector/profile endpoint and search the results for the profile you are interested in.

Example cURL Request #

curl --request POST --location 'https://test.dev.luciduminc.net/CMDB/v2/connector/test/async' \
--header 'Content-Type: application/json' \
--header 'Authorization: Bearer **********' \
--data '{
"connector_name": "api",
"bridge_name": "datadog",
"profile_name": "customer_support",
}'
  • Line 1. The cURL call. We specified “–request POST” so we can send data to Lucidum. The URL is host name plus the endpoint for the connector API.

  • Line 1. The The “\” (backslash) at the end of a line indicates to continue the cURL command on the next line and process all the lines as a single request.

  • Line 2. The header specifies to return results in JSON.

  • Line 3. The header specifies to use a Bearer Token for authentication and provides the bearer token.

  • Line 4. The data to send to Lucidum.

  • Line 5. “connector_name”: “api”  is required. This parameter is identical for all connectors.

  • Line 6. “bridge_name”: “datadog” This parameter specifies the connector to create a profile for.

    NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

  • Line 7. profile_name: “api profile 1”. This parameter specifies the profile to delete.

    NOTE: To find the profile_name for a connector, you can use the /CMDB/v2/connector/profile endpoint and search the results for the connector you are interested in.

Example Response #

{
    “traceId”: “66f418ec69a1e873b8ef4f57”
}

Viewing Test Results: /CMDB/v2/connector/test/result #

This endpoint tests a single connector using a single profile.

Method

Parameters in URL

/CMDB/v2/connector/test/result

GET

  • traceId: <traceId returned by /CMDB/v2/connector/test/async endpoint>

NOTE: To find the traceID for test results, you can use the /CMDB/v2/connector/test/async endpoint. This endpoint returns the traceID.

Example cURL Request #

curl --location 'https://test.dev.luciduminc.net/CMDB/v2/connector/test/result?traceId=66f418ec69a1e873b8ef4f57' \
--header 'Content-Type: application/json' \
--header 'Authorization: Bearer **********' \
  • Line 1. The cURL call. If no method is specified, the method defaults to GET. The URL is host name plus the endpoint for the connector API.

  • Line 1. The “?” (question mark) character specifies that all the text to the right of the character is a parameter.

  • Line 1. traceId=66f418ec69a1e873b8ef4f57. This parameter specifies the test results to display.

    NOTE: To find the traceID for test results, you can use the /CMDB/v2/connector/test/async endpoint. This endpoint returns the traceID.

  • The The “\” (backslash) at the end of a line indicates to continue the cURL command on the next line and process all the lines as a single request.

  • Line 2. The header specifies to return results in JSON.

  • Line 3. The header specifies to use a Bearer Token for authentication and provides the bearer token.

Example Response #

{
    “connector_name”: “api”,
    “bridge_name”: “datadog”,
    “trace_id”: “66f41e0b69a1e873b8ef4f62”,
    “profile_db_id”: “66d72e68ccb4dc5bc98c286e”,
    “test_result”: [
        {
            “name”: “datadog_user”,
            “status”: “FAIL”,
            “message”: “403 Client Error: Forbidden for url: https://api.datadoghq.com/api/v2/users?page%5Bnumber%5D=0&page%5Bsize%5D=2”,
            “details”: [
                {
                    “name”: “connection”,
                    “status”: “OK”,
                    “message”: “success”
                },
                {
                    “name”: “http_error”,
                    “status”: “FAIL”,
                    “message”: “403 Client Error: Forbidden for url: https://api.datadoghq.com/api/v2/users?page%5Bnumber%5D=0&page%5Bsize%5D=2”
                }
            ],
            “display_name”: “Datadog User”
        },
        {
            “name”: “datadog_host”,
            “status”: “FAIL”,
            “message”: “403 Client Error: Forbidden for url: https://api.datadoghq.com/api/v2/hosts?start=0&count=5”,
            “details”: [
                {
                    “name”: “connection”,
                    “status”: “OK”,
                    “message”: “success”
                },
                {
                    “name”: “http_error”,
                    “status”: “FAIL”,
                    “message”: “403 Client Error: Forbidden for url: https://api.datadoghq.com/api/v2/hosts?start=0&count=5”
                }
            ],
            “display_name”: “Datadog Host”
        },
        {
            “name”: “datadog_container”,
            “status”: “FAIL”,
            “message”: “403 Client Error: Forbidden for url: https://api.datadoghq.com/api/v2/containers?page%5Bsize%5D=5”,
            “details”: [
                {
                    “name”: “connection”,
                    “status”: “OK”,
                    “message”: “success”
                },
                {
                    “name”: “http_error”,
                    “status”: “FAIL”,
                    “message”: “403 Client Error: Forbidden for url: https://api.datadoghq.com/api/v2/containers?page%5Bsize%5D=5”
                }
            ],
            “display_name”: “Datadog Container”
        }
    ],
    “last_tested_at”: “2024-09-25T14:28:55.307+00:00”,
    “status”: “done”
}

Enable or Disable a Connector Service: /CMDB/v2/connector/profile/service #

This endpoint disables or enables a service for a specified profile and connector combination.

Method

Parameters in URL

/CMDB/v2/connector/profile/service

PUT

  • connector_name: api
  • bridge_name: <bridge name of connector>
  • profile_name: <profile name you want to enable or disable>
  • services_list: <service_list>. You must include the name of the service and the value for “activity”.
    • To enable a service: “activity”: true
    • To disable a service: “activity”: false

NOTE: To find the bridge_name of a connector, you can use the /CMDB/v2/connector endpoint and search the results for the connector you are interested in.

NOTE: To find the profile_name for a connector, you can use the /CMDB/v2/connector/profile endpoint and search the results for the profile you are interested in.

NOTE: To find the services_list for a connector, you can use the /CMDB/v2/connector/profile endpoint and search the results for the profile you are interested in. Not all connectors have multiple services.

Example cURL Request #

curl --location --request PUT 'https://dogfood.lucidum.cloud/CMDB/v2/connector/profile/service' \
--header 'Content-Type: application/json' \
--header 'Authorization: Bearer **********' \
--data '{
"profile_name": "Test",
"bridge_name": "crowdstrike",
"connector_name": "api",
"services_list": [
{
"service": "crowdstrike_host",

"activity": false

}
]
}'
  • Line 1. The cURL call. We specified “–request PUT” so we can update data to Lucidum. The URL is host name plus the endpoint for the connector API.

  • Line 1. The The “\” (backslash) at the end of a line indicates to continue the cURL command on the next line and process all the lines as a single request.

  • Line 2. The header specifies to return results in JSON.

  • Line 3. The header specifies to use a Bearer Token for authentication and provides the bearer token.

  • Line 4. The data to send to Lucidum.

  • Line 5. “profile_name”: “Test “. The name of the profile for this instance of the connector.

  • Line 6. “bridge_name”: “crowdstrike” This parameter specifies the connector for which we want to start or stop a service.

  • Line 7. “connector_name”: “api”  is required. This parameter is identical for all connectors.

  • Line 8. “services_list”: specifies one or more services to start of stop.

  • Line 9. “service”: “crowdstrike_host” specifies the service to start or stop.

  • Line 10 “activity”: false specifies to stop the service. Setting “activity” to true starts the service.

Example Response #

In the JSON response, we can see that the Connector Profile was updated so that the service CrowdStrike Host was disabled. This is the same action as toggling off the services in the Lucidum UI.

{
    “host”: “https://api.us-2.crowdstrike.com”,
    “client_id”: “***********************”,
    “api_secret”: “*************************”,
    “threading”: false,
    “verify_ssl”: false,
    “field_metadata”: {
        “host”: “required”,
        “client_id”: “required”,
        “api_secret”: “encrypt;required”
    },
    “field_display”: {
        “host”: {
            “display_name”: “URL”,
            “description”: “The URL of the CrowdStrike API. For example, https://api.crowdstrike.com”
        },
        “verify_ssl”: {
            “display_name”: “Verify SSL”,
            “description”: “Toggle on/off validation of SSL certificate”
        },
        “client_id”: {
            “display_name”: “Client ID”,
            “description”: “CrowdStrike client ID”
        },
        “api_secret”: {
            “display_name”: “API Secret”,
            “description”: “CrowdStrike API secret”
        },
        “threading”: {
            “display_name”: “Parallel Data Collection”,
            “description”: “Toggle on/off parallel data collection, default is single threading”
        }
    },
    “active”: true,
    “bridge_name”: “crowdstrike”,
    “connector_name”: “api”,
    “description”: “CrowdStrike Falcon Endpoint Protection is a cloud-based platform that protects laptops, desktops, and servers from breaches.”,
    “display_name”: “CrowdStrike Falcon Endpoint Protection”,
    “group”: “Endpoint Detection and Protection”,
    “profile_name”: “Test”,
    “services_list”: [
        {
            “platform”: “api”,
            “type”: “”,
            “display_name”: “CrowdStrike Host”,
            “service”: “crowdstrike_host”,
            “status”: “OK”,
            “message”: “success”,
            “activity”: false
        }
    ],
    “status”: “available”,
    “modified_time”: “2025-09-02T21:32:01.629276605Z”,
    “last_tested_at”: “2025-09-02T01:29:26.927+00:00”,
    “profile_id”: “66798a96fd2e8f6ec7d1f91f”
}
What are your Feelings

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

Still stuck? How can we help?

Updated on September 3, 2025
Endpoints for System MetricsEndpoints for Data Ingestion
Table of Contents
  • Headers
  • Retrieve the List of Connectors: /CMDB/v2/connector
    • Example cURL Request
    • Example Response
  • Retrieve Configuration Details About a Single Connector: /CMDB/v2/connector/config
    • Example cURL Request
    • Example Response
  • Create a Profile for a Connector: /CMDB/v2/connector/profile
    • Finding config.field_metadata
    • Example cURL Request
    • Example Response
  • Retrieve the List of Profiles for All Connectors: /CMDB/v2/connector/profile
    • Example cURL Request
    • Example Response
  • Retrieve a Single Profile for a Single Connector: /CMDB/v2/connector/profile
    • Example cURL Request
    • Example Response
  • Delete a Single Profile for a Single Connector: /CMDB/v2/connector/profile
    • Example cURL Request
    • Example Response
  • Test a Connector: /CMDB/v2/connector/test/async
    • Example cURL Request
    • Example Response
  • Viewing Test Results: /CMDB/v2/connector/test/result
    • Example cURL Request
    • Example Response
  • Enable or Disable a Connector Service: /CMDB/v2/connector/profile/service
    • Example cURL Request
    • Example Response

Quick LInks

  • splunk Splunk
  • Elastic
  • Chronicle
  • Sentinel
  • SumoLogic_Lockup_SumoBlue_RGBCreated with Sketch. Sumo Logic
  • CrowdStrike
Linkedin Youtube X-twitter Facebook

@ 2025 Lucidum, Inc. Design By Sandman Studios

SOLUTIONS

COMPANY

RESOURCES

Solutions

  • Modernize Sec Ops
  • Risk & Vulnerability
  • Data Management
  • CISO Tool Kit

COMPANY

  • About Us
  • Testimonials
  • Patents

Resource Library

  • Documentation
  • E-Books
  • White Papers
  • Videos
  • Blogs