1. Home
  2. Integrations
  3. Integration with Netsparker

Integration with Netsparker

This article covers the steps required to integrate your Phoenix Security account with Netsparker.


– In order to create a new scanner integration you should have access to the platform as an Org Admin user.
– To connect your account to Netsparker you need to have the required User ID and Token.

Netsparker API Credentials

To integrate with the Netsparker API you need a valid set of User ID/Token. In order to do so, please follow the instructions below, which are a summary of the ones here.

  1. Log in to Netsparker. https://www.netsparkercloud.com/account/signin
  2. Select [Your Name] (top right of the page) > API Settings.
  1. In the Current Password field, enter your current password.
  2. Select Submit to view your User ID and Token.

You will need the User ID and Token when configuring the integration between Phoenix Security and Netsparker.

The user that the ID/Token are generated for must have enough permissions to see the information that needs to be accessed through the API.

Create a Netsparker Integration

  1. On the sidebar menu, navigate to the Scanners tab in the Integrations section.
  1. Click on the “Add Scanner Integration” button on the right side of the page.
  1. On the second step you need to provide the required details for the scanner integration. In the case of Netsparker you need to provide:
  • Name: The name for this integration.
  • Server URL: This is optional. You only need to provide this if you know that your account’s API URL is different than the default.
  1. In the next step you will be able to select whether the platform fetches all the assets and vulnerabilities available form the scanner, or you can include/exclude individual “targets” (applications, project, etc), if supported by the scanner.
  1. To finish the configuration click on “Create Scanner“.

Unless there are issues with the credentials, the new scanner will appear in your list of integrations (under Integrations > Scanners) and the platform will start to collect asset and vulnerability details from all Subscriptions available through the integration credentials.

All the scanner’s assets and vulnerabilities will be automatically added to your account’s Default Application, and will be available to start assigning them to user-created Applications as required.

Updated on July 14, 2023

Related Articles

x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
Shield Security