Home · Docs · Connector Setup Guide

Connectors Setup Guide

Last updated: 2026-04-29
Status: Stable


Purpose

Step-by-step walkthrough of the Tool Catalog connector wizard. Covers the full lifecycle: finding a connector, entering credentials, testing, saving, and monitoring health.


The Tool Catalog Wizard

URL: /tool-catalog.html

Tool Catalog

The Tool Catalog is the single place to configure all 61 connectors. It replaces manual API credential entry and provides inline setup guides so you don't need to leave URIP to find documentation.

Finding a Connector

Search: Type the tool name in the search bar. Partial matches work ("crowd" finds "CrowdStrike Falcon").

Category filter: Filter by: VM, EDR, CSPM, DSPM, IDENTITY, NETWORK, DLP, FIREWALL, SOC, EMAIL, COLLABORATION, ITSM, LMS, PAM, NAC, OT, DAST, BAS, EASM, EXTERNAL_THREAT, ADVISORY, BUG_BOUNTY, GRC, BGV, HRIS.

Status filter: - All — shows both configured and available connectors - Configured — only connectors with credentials stored - Available — only connectors not yet configured


Setting Up a Connector

Step 1: Click the Tile

Click any connector tile. The Setup Drawer opens on the right side of the screen.

Step 2: Read the Setup Drawer

The drawer contains six sections:

Section Content
Quick Facts Poll frequency, data freshness, setup difficulty, module requirement
What's Pulled Exact finding types, asset types, and data fields URIP ingests
Prerequisites What you need before starting: vendor plan, API permissions, admin access
Setup Steps Numbered instructions with credential field explanations and vendor doc links
Required Scopes API permissions / OAuth scopes required (copy-paste ready)
Common Errors The most frequent errors and how to fix them

Read the Prerequisites section first. Some connectors require vendor-side API configuration before you can enter credentials.

Step 3: Enter Credentials

Fill in the credential fields shown in the form. Each field has: - A label (e.g., "API Access Key") - A help icon (hover for explanation) - A link to the exact vendor documentation page where you find this value - A placeholder showing the expected format

Credential field types:

Type UI behaviour
text Plain text input
secret Password-masked input (shows dots), never displayed after save
url URL validator applied
select Dropdown from predefined options

Step 4: Test Connection

Click Test Connection. URIP sends a live request to the vendor API using the credentials you entered.

Results:

Result Meaning
Connected. Found X assets. Last scan: Y hours ago. Credentials valid, API accessible, data available
HTTP 401 — Authentication failed Credentials are wrong or expired
HTTP 403 — Insufficient permissions Credentials are valid but lack required role/scope
HTTP 429 — Rate limited Vendor API is rate-limiting; wait 60 seconds and retry
Connection timeout Vendor API unreachable; check network or vendor status page
Invalid credential format Field has unexpected characters; re-enter carefully

The test does NOT save credentials. You must click Save after a successful test.

Step 5: Save

Click Save. Credentials are: 1. Transmitted securely (encrypted in transit) to URIP 2. Encrypted with a unique key for your organisation before storage 3. Never logged or displayed again after this point

The connector tile immediately updates to show Configured status.

Step 6: First Poll

The first automatic poll runs within 15 minutes of saving. Poll schedule:

Category Frequency
High-volume (Tenable, CrowdStrike, SentinelOne, Zscaler) 15 minutes
Medium-volume (Netskope, Entra ID, Okta, ManageEngine) 60 minutes
Low-volume (Burp Enterprise, GTB, CloudSEK) 4 hours

To poll immediately: click Run Now in the connector drawer (requires ciso role).


Monitoring Connector Health

URL: /connector-status.html

This page shows all configured connectors with: - Status pill: ok / degraded / error - Last successful poll timestamp - Records ingested in the last poll - Error count in the last 24 hours - Last error message (if any)

Status definitions:

Status Meaning Action
ok Last poll succeeded, data is fresh No action needed
degraded Last poll succeeded partially (rate-limited or partial data) Monitor; usually self-recovers
error Last poll failed Read last error message and fix credentials or permissions

Re-testing and Updating Credentials

Credentials expire at the vendor's rotation schedule (usually 90 days for API keys, 30 days for some tokens).

When a connector goes to error status with "HTTP 401":

  1. Go to Tool Catalog → click the connector tile
  2. Generate a new API key in the vendor portal
  3. Enter the new key in the credential form
  4. Click Test Connection → verify success
  5. Click Save

The old encrypted credentials are overwritten.


Removing a Connector

  1. Tool Catalog → connector tile
  2. Scroll to the bottom of the setup drawer
  3. Click Disconnect
  4. Confirm removal

This deletes the encrypted credentials. Historical findings collected by this connector remain in the Risk Register with the connector name as their source.


Bulk Connector Management

If you manage many connectors, use these techniques to save time:

Action How to do it
View all statuses at once Navigate to Connector Status — a single page showing every configured connector with colour-coded status pills
Re-test multiple connectors Tool Catalog → click each connector tile → Test Connection. There is no bulk re-test button, but the test takes only a few seconds per connector
Identify widespread issues On Connector Status, sort by Error count (24h) — if multiple connectors show errors simultaneously, the cause is usually network-level (proxy change, firewall rule update, certificate expiry)
Update credentials in bulk There is no bulk credential update for security reasons. Each connector must be updated individually in the Tool Catalog

Connector Failure Impact on Reporting

When a connector goes offline, it does not just show a red light — it directly affects your dashboards and compliance scores.

What breaks Why
Risk Dashboard New findings from the offline tool stop arriving. Risks already in the register remain, but their status may become stale (e.g., a patched vulnerability still shows as open because the tool cannot confirm the fix).
Compliance scores Controls that depend on the offline connector's data become "inconclusive" after the data ages out. This can cause a framework score to drop without any real security degradation.
SLA tracking If the connector cannot confirm a fix, risks stay "Open" even if they were remediated. This inflates your overdue count.
Threat Intel IOC matches and KEV flags for assets from the offline tool may be incomplete.

What to do when a connector goes offline overnight: 1. Check Connector Status first thing in the morning 2. Read the Last error message 3. Fix the root cause (usually expired credentials or a network change) 4. Click Run Now to trigger an immediate poll 5. Watch the Risk Register and Compliance Dashboard update within 15 minutes

Multi-Connector De-duplication

When the same vulnerability appears from multiple tools (for example, both CrowdStrike Spotlight and Tenable report the same CVE on the same host), URIP automatically deduplicates:

  • The finding is merged into a single row in the Risk Register
  • Both tools are listed as sources
  • The highest score is kept
  • Remediation steps from all sources are consolidated

This means your Risk Register does not multiply when you add more connectors — it gets smarter and more complete.


OAuth Connectors

Some connectors use OAuth (Microsoft Entra ID, Google Workspace):

  1. In the connector drawer, click Authorise with Microsoft (or Google)
  2. A popup opens with the vendor's consent screen
  3. Log in with an account that has admin consent authority
  4. Grant the listed permissions
  5. The popup closes and the drawer shows a success state
  6. Click Save

OAuth tokens are stored securely using the same encryption as API keys.


Connector Setup Checklist

Before configuring a connector, verify:

  • [ ] You have the required vendor subscription or plan tier
  • [ ] You have the administrator privileges in the vendor portal to generate API keys
  • [ ] You have granted the required API scopes or permissions
  • [ ] The API endpoint URL is correct (use the default for cloud-hosted tools; enter your on-premise URL if applicable)
  • [ ] If your organisation restricts outbound network access, confirm that the URIP service can reach the vendor API. Your URIP account manager can provide the IP range to allowlist if needed.

Common Connector-Specific Notes

Tenable

  • Generate key pair under Settings → My Account → API Keys
  • The key needs Scanner role in Tenable, not just Reader

CrowdStrike

  • Create an OAuth2 client in the Falcon console → API Clients and Keys
  • Scopes needed: Detections:Read, Vulnerabilities:Read, Hosts:Read, Prevention Policy:Read

Microsoft Entra ID

  • Register an App in Azure AD → API permissions → add Microsoft Graph permissions
  • Must grant admin consent (not just user consent) for the listed permissions
  • Client Secret expires — calendar a reminder before expiry

SentinelOne

  • API token is per-Site or per-Account — ensure it covers all Sites you want to monitor
  • Site ID is visible in the Singularity console URL when viewing a site

Okta

  • Create an API Token in Okta Admin → Security → API → Tokens
  • Token inherits the generating user's permissions — use a dedicated service account

Jira

  • API token generation: Atlassian account → Security → API tokens (not Jira admin panel)
  • The project key is the short code (e.g., SEC, not the full project name)

See Also