Overview

To authenticate with Cyberimpact, you need the following prerequisites:

  1. API Key - A Cyberimpact API Key

This guide will walk you through finding or creating those credentials within Cyberimpact.

Prerequisites:

  • You must set up an account with Cyberimpact, using the Plus or Pro plan.

Step 1: Creating a Cyberimpact API Key

The Cyberimpact API uses API tokens to authenticate requests. You can view and manage your API tokens in the Developers / API tokens menu of the Cyberimpact application.

Your API tokens carry many privileges, so share them securely and only with people you trust. They are the access to your account, so this information should not be public.

Step 2: Enter your credentials

Enter your credentials as follows:

  • API Key: Your API key

Click “Connect” to complete the authentication.