# Get the Display Names for the Security Criteria
source: https://developer.mastercard.com/riskrecon-api/documentation/testing/displaynames-samples/sec-crt-disp-nms-smpl/index.md

Allows you to retrieve a one-to-one mapping of each security criteria name as they are presented in the API response and the RiskRecon web portal.

## Pre-requisites {#pre-requisites}

Refer to the [Retrieve Display Names for Security Criteria](https://developer.mastercard.com/riskrecon-api/documentation/use-cases/navigation-and-access/displayname/retrve-disp-nm-sec-crit/index.md) use case.

## Request URL for Sandbox environment {#request-url-for-sandbox-environment}

    https://api.sandbox.riskrecon.com/v1/display_names/security_criteria

## Request URL for Production environment {#request-url-for-production-environment}

    https://api.riskrecon.com/v1/display_names/security_criteria

## Test Cases {#test-cases}

### Test Case: Success - Retrieve display names for security criteria {#test-case-success---retrieve-display-names-for-security-criteria}

**Request**

Here is an example of a request made using a `curl` command.

```bash
curl -X 'GET' \
  'https://api.sandbox.riskrecon.com/v1/display_names/security_criteria' \
  -H 'accept: application/json' \
  -H 'Authorization: valid_JWT' \'
```

**Response**

get:

```json
[
  {
    "deprecated": false,
    "display_name": "Encryption Key Length",
    "name": "web_encryption_key_length",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Certificate Expiration Date",
    "name": "web_encryption_date_expire",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Botnet Hosts",
    "name": "threatintel_botnet_host",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Encryption Hash Algorithm",
    "name": "web_encryption_hash",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "CMS Patching",
    "name": "patching_web_cms",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "HTTP Security Headers",
    "name": "web_http_security_headers",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Patching",
    "name": "patching_other",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Email Encryption (STARTTLS)",
    "name": "email_encryption_enabled",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Breach Event: >36 Months",
    "name": "data_loss_36plus",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Malicious Code",
    "name": "malicious_code",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Application Server Patching",
    "name": "patching_app_server",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Command and Control Servers",
    "name": "threatintel_cc_server",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Breach Event: 0 - 6 Months",
    "name": "data_loss_6",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Hosting Fragmentation",
    "name": "defensibility_hosting_providers",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Domain Hijacking Protection",
    "name": "domain_hijacking_protection",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Breach Event: 12 - 24 Months",
    "name": "data_loss_24",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Phishing Sites",
    "name": "threatintel_phishing_site",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Email Hosting Providers",
    "name": "email_hosting_providers",
    "rated": false
  },
  {
    "deprecated": false,
    "display_name": "OpenSSL Patching",
    "name": "patching_openssl",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Unsafe Network Services",
    "name": "unsafe_network_services",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Encryption Protocols",
    "name": "web_encryption_protocol",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Certificate Valid Date",
    "name": "web_encryption_date_valid",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Breach Event: 6 - 12 Months",
    "name": "data_loss_12",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Domain Hijacking Protection",
    "name": "dns_hijacking_protection",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Hostile-Hosts: Hacking",
    "name": "threatintel_hostile_host_hacking",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Email Authentication (SPF or DKIM)",
    "name": "email_authentication",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "High Value System Encryption",
    "name": "unencrypted_sensitive_communications",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "CMS Authentication",
    "name": "config_web_cms_authentication",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "DNS Hosting",
    "name": "dns_hosting_providers",
    "rated": false
  },
  {
    "deprecated": false,
    "display_name": "Other Blacklisted Hosts",
    "name": "threatintel_other",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Spamming Hosts",
    "name": "threatintel_spamming_host",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "High Value System Encryption",
    "name": "unencrypted_sensitive_systems",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "OS Patching",
    "name": "patching_os",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Hostile-Hosts: Scanning",
    "name": "threatintel_hostile_host_scanning",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Cotenant IP Hosting",
    "name": "shared_hosting",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Breach Event: 24 - 36 Months",
    "name": "data_loss_36",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Web Server Patching",
    "name": "patching_web_server",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "External Threat Intelligence",
    "name": "threat_intel_alert_external",
    "rated": false
  },
  {
    "deprecated": false,
    "display_name": "Certificate Subject",
    "name": "web_encryption_subject",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "Hosting Fragmentation",
    "name": "host_hosting_providers",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "OpenSSL Patching",
    "name": "patching_vuln_open_ssl",
    "rated": true
  },
  {
    "deprecated": false,
    "display_name": "External Threat Intelligence Alerts",
    "name": "web_threat_intel_alert_external",
    "rated": false
  },
  {
    "deprecated": false,
    "display_name": "Hosting Geolocations",
    "name": "hosting_countries",
    "rated": false
  },
  {
    "deprecated": false,
    "display_name": "IOT Devices",
    "name": "iot_devices",
    "rated": true
  }
]
```

### Test Case: Fail - Expired or Invalid JWT {#test-case-fail---expired-or-invalid-jwt}

**Request**

Here is an example, using a `curl` command, of a request made with an invalid JWT.

```bash
curl -X 'GET' \
  'https://  'https://api.sandbox.riskrecon.com/v1/display_names/security_criteria' \
  -H 'accept: application/json' \
  -H 'Authorization: invalid_JWT' \'
```

**Response**

HTTP Error Response 401

```json
{
  "Errors": {
    "Error": [
      {
        "Description": "Unauthorized request",
        "Details": "Invalid JWT",
        "ReasonCode": "UNAUTHORIZED",
        "Recoverable": false,
        "Source": "RISKRECON_API"
      }
    ]
  }
}
```

