You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/wiz-data-connector.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ First, you need to create a service account with the required permissions to get
30
30
1. Choose the **Type** of service account to add. It should be **Custom Integration (GraphQL API)**
31
31
1. You can select to limit access to specific projects only by choosing up to 50 projects from the drop-down list. If you aren't sure which project to choose, it's better to leave it empty.
32
32
1. You can set an **Expiration date** for the service account although the recommendation is to leave it empty.
33
-
1. Set the **API Scopes** to "Read all entities".
33
+
1. Set the **API Scopes** to **Read graph resource** and **Read vulnerabilities**
34
34
35
35
> [!Note]
36
36
> At minimum, the Service Account should have permissions of Read graph resources and Read vulnerabilities, though we recommend Read:all permissions as we may retrieve additional data as we further develop connector.
0 commit comments