Skip to main content

Noname Security

Noname Security is an API security tool that analyzes your API landscape to mitigate potential risks. By integrating API endpoint, site, and security data from Noname Security into Brinqa, you can enhance visibility into potential API vulnerabilities, thus strengthening your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Noname Security and how to obtain that information from Noname Security. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Noname Security from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to authenticate Noname Security with Brinqa:

  • Server URL: Your organization's Noname Security server URL. The URL format is https://<ServerName>.

  • API token: The API token associated with the Noname Security account, which must have permissions to log in to the API server and return data.

Generate a Noname Security API token

For the Noname Security connector to use the Noname Management API, you must provide an API token. Only Noname Security Administrators can generate tokens for themselves. You cannot generate a token for other users, even if they have the Admin role.

To generate a token, follow these steps:

  1. Login to your Noname Security portal as an administrator.

  2. Navigate to Settings > User Management.

  3. Click The Users tab and then click Generate API Token.

    Noname Security Generate API Token

Your API token displays. You cannot view the token again after this. Copy and save it to a safe and secure location.

note

If you do not have the permissions to create a token, contact your Noname Security administrator. For additional information, see Noname Security documentation.

Additional settings

The Noname Security connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 100. It is not recommended to go over 100.

  • Parallel requests: The maximum number of parallel API requests. The default setting is 4.

Types of data to retrieve

The Noname Security connector can retrieve the following types of data from the Noname Management API:

Table 1: Data retrieved from Noname Security

Connector ObjectRequiredMaps to Data Model
API EndpointYesAPI Endpoint
Dynamic Code FindingYesDynamic Code Finding
Dynamic Code Finding DefinitionYesDynamic Code Finding Definition
SiteYesSite
info

For detailed steps on how to view the data retrieved from Noname Security in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

API Endpoint

Table 2: API Endpoint attribute mappings

Source Field NameMaps to Attribute
AIRIDsLocal variable
accountIdLocal variable
apiGatewayLocal variable
apiNameLocal variable
apiTypetype
apmNumbersLocal variable
applicationsLocal variable
authLocal variable
backendServerLocal variable
cloudEntitiesTagListLocal variable
dataTypesIdsLocal variable
dataTypeTagsLocal variable
distinctUsersLocal variable
groups.idLocal variable
groups.nameLocal variable
hosttarget
iduid
internetFacingLocal variable
lastSeenlastSeen
lastUpdatesourceLastModified
loadBalancerLocal variable
methodLocal variable
openapiSpecStateLocal variable
ownerowner
pathpath, Local variable
recentlyUpdatedLocal variable
requestDatatypesLocal variable
requestDatatypeTagsLocal variable
resourceGroupNameLocal variable
responseDatatypesLocal variable
responseDatatypeTagsLocal variable
sourcesLocal variable
tagIdsLocal variable
tagsLocal variable
targetHostLocal variable
targetServersLocal variable
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Dynamic Code Finding

Table 3: Dynamic Code Finding attribute mappings

Source Field NameMaps to Attribute
apiIdLocal variable
comments.messageLocal variable
descriptiondescription
detectionTimefirstFound
hosttargets, name, hostnames
iduid
lastUpdatesourceLastModified
methodLocal variable
pathtargets
resourceGroupNameLocal variable
statusstatus, sourceStatus, statusCategory
tickets.aliasLocal variable
titlename
triggeredOnLocal variable
typeIdtype, uid
urlurl
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Dynamic Code Finding Definition

Table 4: Dynamic Code Finding Definition attribute mappings

Source Field NameMaps to Attribute
descriptiondescription
evidenceresults
impactLocal variable
investigateLocal variable
moduleLocal variable
owaspTagstags
remediationrecommendation
severityseverity, severityScore, sourceSeverity
titlename
typeIdtype, uid
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Site

Table 5: Site attribute mappings

Source Field NameMaps to Attribute
apiIdLocal variable
comments.messageLocal variable
hosthostnames, name, targets
methodLocal variable
resourceGroupNameLocal variable
tickets.aliasLocal variable
triggeredOnLocal variable
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Operation options

The Noname Security connector supports the following operation options. See connector operation options for information about how to apply them.

Table 6: Noname Security operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
API EndpointhostAny Noname Security hostReturn only the APIs with the specified host.Key: host Value: example.com This key and value combination only retrieves the APIs with the example.com host.
pathAny Noname Security API pathReturn only the APIs with the specified path.Key: path Value: api/v1/authorizations. This key and value combination only retrieves the APIs with the api/v1/authorizations path.
Dynamic Code FindingseverityInfo, Low, Medium, High, CriticalA comma-separated list of finding severities. Return only the findings with the specified severities, as determined by Noname Security.Key: severity Value: Critical. This key and value combination only retrieves critical findings.
statusAny Noname Security Finding statusA comma-separated list of finding statuses. Return only the findings with the specified status, as determined by Noname Security. For the full list of finding statuses, see Noname Security documentation.Key: status Value: Open,False positive. This key and value combination only retrieves findings with a status of open or false positive.
SiteseverityInfo, Low, Medium, High, CriticalA comma-separated list of finding severities. Return only the sites with the specified severities, as determined by Noname Security.Key: severity Value: High,Critical. This key and value combination only retrieves high and critical sites.
statusAny Noname Security Finding statusA comma-separated list of finding statuses. Return only the findings with the specified status, as determined by Noname Security. For the full list of finding statuses, see Noname Security documentation.Key: status Value: Open,False positive. This key and value combination only retrieves findings with a status of open or false positive.
note

The option keys and values are case-sensitive as they are shown in this documentation.

APIs

The Noname Security connector uses the Noname Management API v3 and v4. Specifically, it uses the following endpoints:

Table 7: Noname Security API Endpoints

Connector ObjectAPI Endpoints
API EndpointGET /api/v3/apis
Dynamic Code FindingGET /api/v4/findings
GET /api/v4/findings/{id}
Dynamic Code Finding DefinitionGET /api/v4/policies/findings
SiteGET /api/v4/findings
GET /api/v4/findings/{id}

Changelog

The Noname Security connector has undergone the following changes:

3.0.2

  • Added the APM_NUMBERS attribute to the API Endpoint object.

3.0.1

  • Fixed an issue where the Dynamic Code Finding sync was failing.

3.0.0