Connect Secure icon

Connect Secure

Consume Connect Secure API

Actions222

Overview

This node allows users to delete a specific domain from the Attack Surface resource in the Connect Secure API. It is useful for security teams or IT administrators who want to manage and reduce their organization's exposed attack surface by removing outdated or irrelevant domain entries. For example, if a domain is no longer in use or has been secured, this node can be used to delete it from the monitoring system.

Properties

Name Meaning
X USER ID The user identifier required for authentication or tracking purposes in the API request.
Id The numeric identifier of the attack surface domain that you want to delete.

Output

The node outputs JSON data representing the response from the API after attempting to delete the specified attack surface domain. This typically includes confirmation of deletion or error details if the operation failed. There is no binary data output.

Dependencies

  • Requires an API key credential for authenticating with the Connect Secure API.
  • The node depends on the Connect Secure API being accessible and properly configured.
  • No additional environment variables are explicitly required beyond the API authentication setup.

Troubleshooting

  • Common issues:

    • Providing an invalid or missing X USER ID header may cause authentication or authorization errors.
    • Using an incorrect or non-existent domain Id will result in a failure to delete and an error response.
    • Network connectivity problems or API downtime can prevent successful execution.
  • Error messages:

    • Errors related to missing or invalid headers usually indicate that the X USER ID was not set correctly.
    • "Not Found" or similar errors suggest the domain ID does not exist.
    • Authentication failures imply issues with the API key or credentials.
  • Resolutions:

    • Verify that the X USER ID is correctly provided and valid.
    • Confirm the domain ID exists before attempting deletion.
    • Check API credentials and network connectivity.

Links and References

  • Connect Secure API documentation (refer to your internal or vendor-provided docs for detailed API usage).
  • n8n documentation on creating and using HTTP request nodes for custom API integrations.

Discussion