diff --git a/README.md b/README.md index 6ece9fae..9ec3beb8 100644 --- a/README.md +++ b/README.md @@ -70,7 +70,7 @@ docker pull debricked/cli ## Scan Once you've installed the CLI, you're ready to scan your project. You can scan a local project, or integrate a scanning mechanism in your CI/CD pipeline. 1. [Sign up to Debricked](https://debricked.com/app/en/register) -2. [Create an access token](https://debricked.com/docs/administration/access-tokens.html#creating-access-tokens) +2. [Create an access token](https://portal.debricked.com/administration-47/how-do-i-generate-an-access-token-130) 3. `debricked scan -t ` When the scan is complete, you will see the total number of vulnerabilities found and a list of automation rules that have been evaluated. Read more about automations [here](https://debricked.com/docs/automation/automation-overview.html#automation-overview). diff --git a/internal/client/request.go b/internal/client/request.go index aad63f04..b8b8687b 100644 --- a/internal/client/request.go +++ b/internal/client/request.go @@ -62,7 +62,7 @@ func interpret(res *http.Response, request func() (*http.Response, error), debCl return nil, NoResErr } else if res.StatusCode == http.StatusUnauthorized { errMsg := `Unauthorized. Specify access token. -Read more on https://debricked.com/docs/administration/access-tokens.html` +Read more on https://portal.debricked.com/administration-47/how-do-i-generate-an-access-token-130` if retry { err := debClient.authenticate() if err != nil { diff --git a/internal/cmd/root/root.go b/internal/cmd/root/root.go index 259e90da..b0580b05 100644 --- a/internal/cmd/root/root.go +++ b/internal/cmd/root/root.go @@ -33,7 +33,7 @@ Complete documentation is available at https://debricked.com/docs/integrations/c "t", "", `Debricked access token. -Read more: https://debricked.com/docs/administration/access-tokens.html`, +Read more: https://portal.debricked.com/administration-47/how-do-i-generate-an-access-token-130`, ) var debClient = container.DebClient()