Skip to main content
Skip table of contents


Illusive Shadow provides undetectable deception technology that creates a hostile environment for attackers, stopping lateral movement and access to your critical assets.

Illusive Spotlight discovers and remediates identity vulnerabilities throughout your environment.

Configuring the Connector for Illusive

To configure Lucidum to ingest data from Illusive:

  1. Log in to Lucidum.

  2. In the left pane, click Connector.

  3. In the Connector page, click Add Connector.

  4. Scroll until you find the Connector you want to configure. Click Connect. The Settings page appears.

  5. In the Settings page, enter the following:

    • URL (required): The URL of the Illusive Networks API

    • API Key (required): Illusive Networks API key

    • Verify SSL. For future use.

  6. To test the configuration, click Test.

    • If the connector is configured correctly, Lucidum displays a list of services that are accessible with the connector.

    • If the connector is not configured correctly, Lucidum displays an error message.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.