Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision | |||
| amzn [2020/02/13 13:00] – [sorcery, product configuration automation solution] mmuze | amzn [2020/02/13 13:01] (current) – [Programmatic UI manipulation] mmuze | ||
|---|---|---|---|
| Line 25: | Line 25: | ||
| * This solution provides a way to programmatically manipulate a web UI to supplement the lack of an API for acquiring vulnerability data. | * This solution provides a way to programmatically manipulate a web UI to supplement the lack of an API for acquiring vulnerability data. | ||
| * This solution was used to ingest vulnerability findings into an ITSM (e.g. ServiceNow) that was used for a partners workflow with their end customers. | * This solution was used to ingest vulnerability findings into an ITSM (e.g. ServiceNow) that was used for a partners workflow with their end customers. | ||
| + | * The solution would authenticate with the UI and then fetch the latest scan results from a specified scan job and save the data as a CSV file that could be readily ingested into an ITSM. | ||
| * **source code:** {{ : | * **source code:** {{ : | ||
| * {{ : | * {{ : | ||
| * [[https:// | * [[https:// | ||