Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
59 commits
Select commit Hold shift + click to select a range
053095a
added manual scan review
JennyHajee Apr 15, 2026
f28eaff
edits
JennyHajee Apr 16, 2026
e2afb08
edits
JennyHajee Apr 17, 2026
468783c
updated nav
JennyHajee Apr 22, 2026
4d2d99a
added 5 new scanners for APIM relaunch
JennyHajee Apr 23, 2026
7f1182d
added new apim relaunch scanners to nav
JennyHajee Apr 23, 2026
34cc579
Added "See Also" sections to various scanner documentation pages, lin…
JennyHajee Apr 24, 2026
2ac6b84
edits
JennyHajee Apr 26, 2026
7595543
edits
JennyHajee Apr 26, 2026
9f0c415
edits
JennyHajee Apr 26, 2026
fe7d7a4
edits
JennyHajee Apr 26, 2026
29285f0
edits
JennyHajee Apr 27, 2026
2cb6374
edit
JennyHajee Apr 27, 2026
689d5da
edit
JennyHajee Apr 27, 2026
bc623a4
added manual review scan details screen
JennyHajee Apr 29, 2026
914017d
added manual review scan details screen
JennyHajee Apr 29, 2026
7e98212
added screen and edit
JennyHajee Apr 29, 2026
ac8f337
edit
JennyHajee Apr 29, 2026
cc96e0e
edit
JennyHajee Apr 29, 2026
51ef165
edit
JennyHajee Apr 29, 2026
e721426
edit
JennyHajee Apr 29, 2026
b51ab3e
edits
JennyHajee Apr 29, 2026
6ec5894
edit to nav
JennyHajee May 1, 2026
69d81e0
edit
JennyHajee May 1, 2026
3a7e203
edits
JennyHajee May 1, 2026
755b66d
Merge branch 'latest' into w-21917743-apim-relaunch-may-1-jh
JennyHajee May 3, 2026
6e45db1
edits to manual review
JennyHajee May 4, 2026
67bb4b8
edits
JennyHajee May 4, 2026
8c58a14
edits
JennyHajee May 4, 2026
36a7d1a
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
f42840f
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
94fab46
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
88252ed
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
88f7b2d
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
b1b143a
Update adding-amazon-gateway-scanner.adoc
Kabilan-s-cx May 6, 2026
2d6cda1
Update adding-amazon-gateway-scanner.adoc
Kabilan-s-cx May 6, 2026
7b4b066
Update adding-amazon-gateway-scanner.adoc
Kabilan-s-cx May 6, 2026
ff5841f
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
25b9bb6
Update adding-apigee-scanner.adoc
Kabilan-s-cx May 6, 2026
fcc279c
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
fa0373d
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
f7bcfcf
Update adding-apigee-scanner.adoc
Kabilan-s-cx May 6, 2026
d40546a
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
0de7da0
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
d2cf64e
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
af7abf6
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
6693a87
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
0697e47
Update adding-azure-api-management-scanner.adoc
Kabilan-s-cx May 6, 2026
f22e009
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
4491593
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
a17dc7f
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
a252845
Update adding-kong-gateway-scanner.adoc
Kabilan-s-cx May 6, 2026
45d5d59
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
4a74267
Update api-scanners.adoc
Kabilan-s-cx May 6, 2026
7ca1bcb
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
3b91f3b
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
94552d8
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
39ff921
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
e27df54
Apply suggestion from @MuleyDak
Kabilan-s-cx May 6, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added modules/ROOT/assets/images/scanner-list.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
25 changes: 19 additions & 6 deletions modules/ROOT/nav.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -56,12 +56,25 @@
** xref:apicat-publish-using-api-catalog-cli.adoc[]
* xref:about-administration-tasks.adoc[]
** xref:discovering-and-importing-external-agents.adoc[]
*** xref:adding-amazon-bedrock-scanner.adoc[]
*** xref:adding-bedrock-agentcore-scanner.adoc[]
*** xref:adding-godaddy-scanner.adoc[]
*** xref:adding-google-vertex-scanner.adoc[]
*** xref:adding-microsoft-copilot-scanner.adoc[]
*** xref:adding-microsoft-foundry-scanner.adoc[]
*** xref:agent-scanners.adoc[]
**** xref:adding-amazon-bedrock-scanner.adoc[]
**** xref:adding-bedrock-agentcore-scanner.adoc[]
**** xref:adding-godaddy-scanner.adoc[]
**** xref:adding-google-vertex-scanner.adoc[]
**** xref:adding-microsoft-copilot-scanner.adoc[]
**** xref:adding-microsoft-foundry-scanner.adoc[]
*** xref:api-scanners.adoc[]
**** xref:adding-azure-api-management-scanner.adoc[]
**** xref:adding-apigee-scanner.adoc[]
**** xref:adding-kong-gateway-scanner.adoc[]
**** xref:adding-amazon-gateway-scanner.adoc[]
*** xref:mcp-scanners.adoc[]
**** xref:adding-agentcore-mcp-scanner.adoc[]
*** xref:aws-scanners.adoc[Amazon Scanners]
*** xref:google-scanners.adoc[Google Scanners]
*** xref:godaddy-scanners.adoc[GoDaddy Scanners]
*** xref:kong-scanners.adoc[Kong Scanners]
*** xref:microsoft-scanners.adoc[Microsoft Scanners]
*** xref:managing-scanners.adoc[]
** xref:importing-agentforce-agents.adoc[]
** xref:to-share-an-asset.adoc[]
Expand Down
67 changes: 67 additions & 0 deletions modules/ROOT/pages/adding-agentcore-mcp-scanner.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
= Adding a Scanner for Amazon AgentCore MCP Server
ifndef::env-site,env-github[]
include::_attributes.adoc[]
endif::[]

Add a scanner to discover, import, and sync MCP servers from Amazon AgentCore into Exchange. Then you can govern the MCP servers and consume them in other applications.

== Before You Begin

Before adding the scanner, verify that you have the permission, context, and these Amazon AgentCore credentials:

* An active AWS account to register and host MCP servers
* Amazon access key ID
* Amazon secret access key
* Amazon region
* Exchange Administrator permission
* An IAM user with an inline policy that allows these permissions:
+
** bedrock-agentcore:ListAgentRuntimes
** bedrock-agentcore:GetAgentRuntime
** bedrock-agentcore:ListAgentRuntimeVersions
** bedrock-agentcore:ListAgentRuntimeEndpoints
** bedrock-agentcore:InvokeAgentRuntime

For more information, see the https://docs.aws.amazon.com/bedrock-agentcore/[Amazon Bedrock documentation].

== Add a Scanner for Amazon AgentCore

. Verify that you are in the business group where you want to add the scanner.
. From the sidebar in Exchange, click *Scanners*.
. Enter a name for the scanner.
. In *Scanner Run Configuration*, complete these fields or options:
+
[%header,cols="1,4"]
|===
|*Field/Option* |*Value*
|*Run Schedule* |Select a frequency and local time.
|*Sync Review* |Select an option: Auto-resolve or Ask to review.
|===
. From *Connection Configuration*, complete these fields:
+
[%header,cols="1,4"]
|===
|*Field* |*Value*
|*Provider* |Select *Amazon*.
|*Platform* |Select *Bedrock AgentCore*.
|*Service Type* |Select *MCPs*.
|*Authentication Method* |Select *Access key*.
|*Access Key ID* |Enter the access key ID.
|*Secret Access Key* |Enter the secret access key.
|*AWS Region* |Select a region.
|===

. Click *Test Connection*.
+
If the connection fails, review the *Connection Configuration* settings. Update the settings, and then test the connection again.
. To send email notifications:
+
.. Select *Advanced Settings* and turn on *Send Email Notifications*.
.. Enter an email address.
. Click *Add Scanner*.

== See Also

* xref:aws-scanners.adoc[AWS scanners]
* xref:discovering-and-importing-external-agents.adoc[Discovering and Cataloging External Assets with Scanners]
* xref:managing-scanners.adoc[Managing Scanners]
37 changes: 9 additions & 28 deletions modules/ROOT/pages/adding-amazon-bedrock-scanner.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -20,39 +20,13 @@ Before adding the scanner, verify that you have the permission, context, and the
** bedrock:ListAgentVersions
** bedrock:GetAgentVersion
+
To create the inline policy, use this policy:

[source,json]
----
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "BedrockAgentDiscoveryPermissions",
"Effect": "Allow",
"Action": [
"bedrock:ListAgents",
"bedrock:GetAgent",
"bedrock:ListAgentAliases",
"bedrock:GetAgentAlias",
"bedrock:ListAgentVersions",
"bedrock:GetAgentVersion",
"bedrock:InvokeModel",
"bedrock:InvokeAgent",
"bedrock:InvokeInlineAgent"
],
"Resource": "*"
}
]
}
----

* To make sure the scanner discovers the agent, assign an alias and link that alias to a version. The scanner ignores agents without an invocable URL.

== Add a Scanner for Amazon Bedrock

. Verify that you are in the business group where you want to add the scanner.
. From the sidebar in Exchange, click *Agent Scanners*.
. From the sidebar in Exchange, click *Scanners*.
. Enter a name for the scanner.
. From *Scanner Run Configuration*, complete these fields or options:
+
Expand All @@ -68,7 +42,8 @@ To create the inline policy, use this policy:
[%header,cols="1,4"]
|===
|*Field* |*Value*
|*Agent Provider* |Select *Amazon Bedrock*.
|*Provider* |Select *Amazon*.
|*Platform* |Select *Bedrock AgentCore*.
|*Authentication Method* |Select *Access key*.
|*Access Key ID* |Enter the access key ID.
|*Secret Access Key* |Enter the secret access key.
Expand All @@ -83,3 +58,9 @@ If the connection fails, review the *Connection Configuration* settings. Update
.. Select *Advanced Settings* and turn on *Send Email Notifications*.
.. Enter an email address.
. Click *Add Scanner*.

== See Also

* xref:aws-scanners.adoc[AWS scanners]
* xref:discovering-and-importing-external-agents.adoc[Discovering and Cataloging External Assets with Scanners]
* xref:managing-scanners.adoc[Managing Scanners]
57 changes: 57 additions & 0 deletions modules/ROOT/pages/adding-amazon-gateway-scanner.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
= Adding a Scanner for Amazon API Gateway
ifndef::env-site,env-github[]
include::_attributes.adoc[]
endif::[]

Add a scanner to discover, import, and sync services from Amazon API Gateway into Anypoint Exchange. Once imported, you can apply governance, enforce policies, and publish them to your developer portal.

== Before You Begin
Before adding the scanner, verify that you have the permission, context, and these Amazon API Gateway credentials:

* Exchange Administrator permission
* AWS APIGatewayScannerReadOnly permission
* Knowledge about the Amazon Web Services region where the services are deployed
* AWS access key ID
* AWS secret access key

== Add a Scanner for Amazon API Gateway
. Verify that you are in the business group where you want to add the scanner.
. From the sidebar in Exchange, click *Scanners*.
. Enter a name for the scanner.
. From *Scanner Run Configuration*, complete these fields or options:
+
[%header,cols="1,4"]
|===
|*Field/Option* |*Value*
|*Run Schedule* |Select a frequency and local time.
|*Sync Review* |Select an option: Auto-resolve or Ask to review.
|===

. From *Connection Configuration*, complete these fields:
+
[%header,cols="1,4"]
|===
|*Field* |*Value*
|*Provider* |Select *Amazon*.
|*Platform* |Select *API Gateway*.
|*Service Type* |*REST APIs* selected by default.
|*Authentication Method* |*Access key* selected by default.
|*AWS Access Key ID* |Enter the access key ID.
|*AWS Secret Access Key* |Enter the secret access key.
|*AWS Region* |Select a region.
|===

. Click *Test Connection*.
+
If the connection fails, review the *Connection Configuration* settings. Update the settings, and then test the connection again.
. To send email notifications:
+
.. Select *Advanced Settings* and turn on *Send Email Notifications*.
.. Enter an email address.
. Click *Add Scanner*.

== See Also

* xref:aws-scanners.adoc[AWS scanners]
* xref:discovering-and-importing-external-agents.adoc[Discovering and Cataloging External Assets with Scanners]
* xref:managing-scanners.adoc[Managing Scanners]
57 changes: 57 additions & 0 deletions modules/ROOT/pages/adding-apigee-scanner.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
= Adding a Scanner for Google Apigee
ifndef::env-site,env-github[]
include::_attributes.adoc[]
endif::[]

Add a scanner to discover, import, and sync services from Google Apigee into Anypoint Exchange. Once imported, you can apply governance, enforce policies, and publish them to your developer portal.

== Before You Begin
Before adding the scanner, verify that you have the permission, context, and these Google Apigee credentials:

* Exchange Administrator permission
* Apigee Read-only Admin permission
* Google Cloud Platform (GCP) project ID
* Service account email
* Private key

== Add a Scanner for Google Apigee
. Verify that you are in the business group where you want to add the scanner.
. From the sidebar in Exchange, click *Scanners*.
. Enter a name for the scanner.
. From *Scanner Run Configuration*, complete these fields or options:
+
[%header,cols="1,4"]
|===
|*Field/Option* |*Value*
|*Run Schedule* |Select a frequency and local time.
|*Sync Review* |Select an option: Auto-resolve or Ask to review.
|===

. From *Connection Configuration*, complete these fields:
+
[%header,cols="1,4"]
|===
|*Field* |*Value*
|*Provider* |Select *Google*.
|*Platform* |Select *Google Apigee*.
|*Service Type* |*REST APIs* selected by default.
|*Authentication Method* |*Service Account* selected by default.
|*GCP Project ID* |Enter the Google Cloud Platform project ID.
|*Service Account Email* |Enter the service account email.
|*Private Key* |Enter the private key.
|===

. Click *Test Connection*.
+
If the connection fails, review the *Connection Configuration* settings. Update the settings, and then test the connection again.
. To send email notifications:
+
.. Select *Advanced Settings* and turn on *Send Email Notifications*.
.. Enter an email address.
. Click *Add Scanner*.

== See Also

* xref:google-scanners.adoc[Google scanners]
* xref:discovering-and-importing-external-agents.adoc[Discovering and Cataloging External Assets with Scanners]
* xref:managing-scanners.adoc[Managing Scanners]
63 changes: 63 additions & 0 deletions modules/ROOT/pages/adding-azure-api-management-scanner.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,63 @@
= Adding a Scanner for Azure API Management
ifndef::env-site,env-github[]
include::_attributes.adoc[]
endif::[]

Add a scanner to discover, import, and sync services from Azure API Management into Anypoint Exchange. Once imported, you can apply governance, enforce policies, and publish them to your developer portal.

== Before You Begin
Before adding the scanner, verify that you have the permission, context, and these Amazon API Gateway credentials:

* Exchange Administrator permission
* API Management Service Reader Role permission
* Tenant ID
* Client ID
* Client Secret
* Subscription ID
* Resource Group
* Service Name

== Add a Scanner for Azure API Management
. Verify that you are in the business group where you want to add the scanner.
. From the sidebar in Exchange, click *Scanners*.
. Enter a name for the scanner.
. From *Scanner Run Configuration*, complete these fields or options:
+
[%header,cols="1,4"]
|===
|*Field/Option* |*Value*
|*Run Schedule* |Select a frequency and local time.
|*Sync Review* |Select an option: Auto-resolve or Ask to review.
|===

. From *Connection Configuration*, complete these fields:
+
[%header,cols="1,4"]
|===
|*Field* |*Value*
|*Provider* |Select *Microsoft*.
|*Platform* |Select *Azure API Management*.
|*Service Type* |*REST APIs* selected by default.
|*Authentication Method* |*OAuth* selected by default.
|*Tenant ID* |Enter the tenant ID.
|*Client ID* |Enter the client id.
|*Client Secret* |Enter the client secret.
|*Subscription ID* |Enter the subscription ID.
|*Resource Group* |Enter the resource group.
|*Service Name* |Enter the service name.
|===

. Click *Test Connection*.
+
If the connection fails, review the *Connection Configuration* settings. Update the settings, and then test the connection again.
. To send email notifications:
+
.. Select *Advanced Settings* and turn on *Send Email Notifications*.
.. Enter an email address.
. Click *Add Scanner*.

== See Also

* xref:microsoft-scanners.adoc[Microsoft scanners]
* xref:discovering-and-importing-external-agents.adoc[Discovering and Cataloging External Assets with Scanners]
* xref:managing-scanners.adoc[Managing Scanners]
13 changes: 10 additions & 3 deletions modules/ROOT/pages/adding-bedrock-agentcore-scanner.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -50,23 +50,24 @@ For more information, see the https://docs.aws.amazon.com/bedrock-agentcore/[Ama
== Add a Scanner for Amazon Bedrock AgentCore

. Verify that you are in the business group where you want to add the scanner.
. From the sidebar in Exchange, click *Agent Scanners*.
. From the sidebar in Exchange, click *Scanners*.
. Enter a name for the scanner.
. In *Scanner Run Configuration*, complete these fields or options:
+
[%header,cols="1,4"]
|===
|*Field/Option* |*Value*
|*Run Schedule* |Select a frequency and local time.
|*Sync Review* |Only *Auto-resolve* is supported.
|*Sync Review* |Select an option: Auto-resolve or Ask to review.
|===

. From *Connection Configuration*, complete these fields:
+
[%header,cols="1,4"]
|===
|*Field* |*Value*
|*Agent Provider* |Select *AgentCore*.
|*Provider* |Select *Amazon*.
|*Platform* |Select *Bedrock AgentCore*.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@JennyHajee, QAX still shows this as "AWS AgentCore". May be worth validating with Anshul if the naming update is going out with this release

|*Asset Type* |Only agents are supported.
|*Authentication Method* |Select *Access key*.
|*Access Key ID* |Enter the access key ID.
Expand All @@ -82,3 +83,9 @@ If the connection fails, review the *Connection Configuration* settings. Update
.. Select *Advanced Settings* and turn on *Send Email Notifications*.
.. Enter an email address.
. Click *Add Scanner*.

== See Also

* xref:aws-scanners.adoc[AWS scanners]
* xref:discovering-and-importing-external-agents.adoc[Discovering and Cataloging External Assets with Scanners]
* xref:managing-scanners.adoc[Managing Scanners]
Loading