IBM Security Randori REST API protocol log source parameters for IBM Security Randori Recon
Add an IBM Security Randori Recon log source that uses the IBM Security Randori REST API protocol.
When you use the IBM Security Randori REST API protocol, there are specific parameters that you must configure.
|Log Source type||IBM Security Randori Recon|
|Protocol Configuration||IBM Security Randori REST API|
|Log Source Identifier||The Log Source identifier can be any valid value and does not need to reference a specific server. It can also be the same value as the Log Source Name. If you have more than one configured IBM Security Randori REST API data source, ensure that you give each one a unique name.|
|API Key||The API key that is used to access the IBM Security Randori REST API.
You must have Randori access to obtain the API key value.
For more information about obtaining this value, see How to Add an API token (https://www.ibm.com/docs/en/SSD5I5K/intapi_api_AddAPIToken.html).
For a complete list of IBM Security Randori REST API protocol parameters and their values, see IBM Security Randori REST API protocol configuration options.