Skip to content

Commit af3f633

Browse files
authored
Change API Scopes to 'Read graph resource' and 'Read vulnerabilities'
Updated API Scopes for service account configuration.
1 parent 9e38b1f commit af3f633

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

exposure-management/wiz-data-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ First, you need to create a service account with the required permissions to get
3030
1. Choose the **Type** of service account to add. It should be **Custom Integration (GraphQL API)**
3131
1. You can select to limit access to specific projects only by choosing up to 50 projects from the drop-down list. If you aren't sure which project to choose, it's better to leave it empty.
3232
1. You can set an **Expiration date** for the service account although the recommendation is to leave it empty.
33-
1. Set the **API Scopes** to "Read all entities".
33+
1. Set the **API Scopes** to **Read graph resource** and **Read vulnerabilities**
3434

3535
> [!Note]
3636
> At minimum, the Service Account should have permissions of Read graph resources and Read vulnerabilities, though we recommend Read:all permissions as we may retrieve additional data as we further develop connector.

0 commit comments

Comments
 (0)