Skip to main content
Skip table of contents

Vulcan Cyber

Vulcan Cyber manages the full vulnerability risk lifecycle for all IT assets and cyber surfaces including application, cloud, and traditional infrastructure environments. Vulcan Cyber analyzes, contextualizes, prioritizes, and manages all vulnerability and risk data while efficiently orchestrating remediation campaigns.

Creating an API Key for

Before configuring the Vulcan Cyber connector in Lucidum, you must first create an API Key. Lucidum will use the API key to access the Vulcan Cyber API.

To create an API Token in Vulcan Cyber:

  1. Login to Vulcan Cyber.

  2. Click on your user name at the top right corner

  3. Go to Account > API Tokens (OAuth2 Authentication).

  4. Specify the following:

    • Name. Name of the token.

    • Expiration Date. The expiration date for the token.

  5. Click Generate token to generate an OAuth 2 token.

  6. Copy and paste the token on your local computer.

Configuring the Connector for Vulcan Cyber

To configure Lucidum to ingest data from Vulcan Cyber:

  1. Log in to Lucidum.

  2. In the left pane, click Connector.

  3. In the Connector page, click Add Connector.

  4. Scroll until you find the Connector you want to configure. Click Connect. The Settings page appears.

  5. In the Settings page, enter the following:

    • URL (required): The URL of the Vulcan Cyber API

    • API Token (required) - The Vulcan Cyber API token. To acquire an API Token, see Acquiring an API Token.

    • Verify SSL. For future use.

  6. To test the configuration, click Test.

    • If the connector is configured correctly, Lucidum displays a list of services that are accessible with the connector.

    • If the connector is not configured correctly, Lucidum displays an error message.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.