You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/deployment/connect-scm.md
+13-2Lines changed: 13 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,6 +49,8 @@ If you opted to scan a GitHub or GitLab repository when you initially signed in,
49
49
50
50
<TabItemvalue='azure-devops-cloud'>
51
51
52
+
### Azure DevOps Cloud
53
+
52
54
1. Sign in to [<iclass="fas fa-external-link fa-xs"></i> Semgrep AppSec Platform](https://semgrep.dev/login).
53
55
1. Optional: If you have created more than one Semgrep account, select the account you want to make a connection for by clicking on the **Navigation bar > Your account name > The account you want to connect**.<br />
@@ -63,6 +65,8 @@ If you opted to scan a GitHub or GitLab repository when you initially signed in,
63
65
</TabItem>
64
66
<TabItemvalue='bitbucket-cloud'>
65
67
68
+
### Bitbucket Cloud
69
+
66
70
1. Sign in to [<iclass="fas fa-external-link fa-xs"></i> Semgrep AppSec Platform](https://semgrep.dev/login).
67
71
1. Optional: If you have created more than one Semgrep account, select the account you want to make a connection for by clicking on the **Navigation bar > Your account name > The account you want to connect**.<br />
@@ -107,6 +111,8 @@ These steps are for users that sign in to Semgrep through a **non-GitHub** SSO p
107
111
108
112
<TabItemvalue='gitlab-cloud'>
109
113
114
+
### GitLab Cloud
115
+
110
116
1. Create a PAT by following the steps outlined in this [guide to creating a PAT](https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html). Ensure that the PAT is created with the required `api` scope.
111
117
1. Sign in to [<iclass="fas fa-external-link fa-xs"></i> Semgrep AppSec Platform](https://semgrep.dev/login).
112
118
1. Optional: If you have created more than one Semgrep account, select the account you want to make a connection for by clicking on the **Navigation bar > Your account name > The account you want to connect**.<br />
@@ -135,6 +141,7 @@ You have successfully connected an org in Semgrep AppSec Platform with an organi
135
141
136
142
<TabItemvalue='bitbucket-data-center'>
137
143
144
+
### Bitbucket Data Center
138
145
139
146
1. Create an HTTP Access Token for your project following the steps outlined in [<iclass="fas fa-external-link fa-xs"></i> Bitbucket Data Center documentation](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html). Ensure that the access token is created with `PROJECT_ADMIN` permissions.
140
147
1. Copy the token for use in the next steps.
@@ -154,6 +161,8 @@ You have successfully connected an org in Semgrep AppSec Platform with an organi
154
161
</TabItem>
155
162
<TabItemvalue='github-enterprise'>
156
163
164
+
### GitHub Enterprise
165
+
157
166
This section is applicable to users on a **GitHub Enterprise Server** plan.
158
167
159
168
The **Semgrep App for GitHub Enterprise (GHE)** creates a connection between Semgrep
@@ -163,7 +172,7 @@ and orgs in your GHE deployment. There are two primary installation steps:
163
172
that "owns" the app.
164
173
2. Install the app for additional GHE orgs.
165
174
166
-
### Initial Semgrep App installation
175
+
####Initial Semgrep App installation
167
176
168
177
If your deployment contains many orgs, you must **choose an org** among your accounts that acts as the **owner** of the Semgrep App. As the owner, this org controls the settings and permissions granted to the app.
169
178
@@ -199,7 +208,7 @@ At this point, you've successfully installed the GHE Semgrep App on the owner GH
0 commit comments