Organization API Key Scopes
When creating an API key in the organization settings, you can predefine access permissions for this key by selecting the relative scopes. The following table describes the permissions each scope provides.
Scope | Description |
|---|---|
| Enables communication between a Repeater and the Bright engine |
| Provides unrestricted access to discoveries |
| Allows deleting discoveries |
| Allows editing discoveries |
| Allows viewing existing discoveries |
| Allows running discoveries |
| Allows stopping discoveries |
| Provides unrestricted access to entry points |
| Allows creating, editing, deleting, testing and previewing changes made to entrypoints |
| Allows viewing entry points |
| Allows reading and downloading files from the storage |
| Allows to associate files with projects, clone files, upload or delete them |
| Provides administrative control over groups only and should not be required for viewing members. |
| Allows deleting groups |
| Allows creating, editing, and deleting groups, but does not control member visibility. |
| Allows viewing groups |
| Allows viewing resources of the integrated services, for example, GitHub repositories, Slack channels, or Jira boards |
| Allows execution and saving scan issues as new |
| Allows viewing detected scan issues |
| Gives access to the Organization tab and general org details, but does not grant visibility into members. |
| Allows editing company name and enforcing MFA |
| Allows creating organization API keys (tokens) |
| Allows viewing the organization's activities log |
| Allows managing group memberships, including adding, editing, and removing members from groups. |
| Allows users to see only the members who share a mutual group with them (excluding “Everyone”). Together with org:read, it enables opening the Organization tab and viewing the filtered member list. |
| Allows unrestricted access to all scan templates |
| Allows users to manage project issues: to change severity, status, and assignee |
| Allows to create projects |
| Allows deleting projects |
| Allows editing project name, number of concurrent scans, adding associated GitHub or Gitlab repositories, Slack channels, Azure or Jira boards, managing webhooks |
| Allows viewing of available projects and project issues. This scope is required for running a scan |
| Allows viewing organization’s repeaters |
| Allows creating, editing, and deleting a repeater, as well as testing repeater connection to a network |
| Allows viewing a list of roles |
| Allows creating, editing, and deleting custom roles. The default roles (for example, “Admin”, “Owner”, etc.) are read-only |
| Allows editing labels in scans that are already running or have been finished |
| Provides unrestricted access to scan management. org:read scope is also required to run and manage scans |
| Allows deleting scans |
| Allows editing scan settings |
| Allows viewing existing scans |
| Allows running and retesting scans |
| Allows stopping scans |
| Provides unrestricted access to scan templates management |
| Allows viewing existing scan templates |
| Allows creating, editing, and deleting custom scan templates |
| Enables user and group provisioning from ADFS and Okta to a Bright organization |
| Allows viewing repeater’s scripts |
| Allows creating, editing, and deleting repeater’s scripts |
Updated 5 days ago