You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/deployment/connect-scm.md
+26-14
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ If you opted to scan a GitHub or GitLab repository when you initially signed in,
56
56
- The **Name of your Azure DevOps organization**
57
57
- Your **Access token**. See [User personal access tokens](https://learn.microsoft.com/en-us/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate) for information on generating a token.
58
58
2. Click **Connect** to save and proceed.
59
-
3. The Azure DevOps organization is now listed under **Source Code managers**. Click **Test** to verify that the new integration is installed correctly.
59
+
3. The Azure DevOps organization is now listed under **Source code managers**. Click **Test** to verify that the new connection is installed correctly.
60
60
61
61
</TabItem>
62
62
<TabItemvalue='bitbucket-cloud'>
@@ -67,34 +67,46 @@ If you opted to scan a GitHub or GitLab repository when you initially signed in,
67
67
1. Go to **<iclass="fa-solid fa-gear"></i> Settings > Source code managers > Add > Bitbucket Cloud**.
68
68
1. In the **Connect your Bitbucket Workspace** dialog box, provide:
69
69
- The **Name of your Bitbucket Workspace**
70
-
- Your **Access token**. Semgrep expects a [workspace-level access token](https://support.atlassian.com/bitbucket-cloud/docs/create-a-workspace-access-token/).
70
+
- Your **Access token**. Semgrep requires a [workspace-level access token](https://support.atlassian.com/bitbucket-cloud/docs/create-a-workspace-access-token/).
71
71
1. Click **Connect** to save and proceed.
72
-
1. The Bitbucket project is now listed under **Source Code managers**. Click **Test** to verify that the new integration is installed correctly.
72
+
1. The Bitbucket project is now listed under **Source code managers**. Click **Test** to verify that the new connection is installed correctly.
73
73
74
74
</TabItem>
75
75
<TabItemvalue='github-cloud'>
76
76
77
+
### GitHub Cloud with GitHub SSO
78
+
79
+
These steps are for users that sign in to Semgrep through GitHub.
80
+
77
81
1. Sign in to [<iclass="fas fa-external-link fa-xs"></i> Semgrep AppSec Platform](https://semgrep.dev/login).
78
82
1. Optional: If you have created more than one Semgrep account, select the account you want to make a connection for by clicking on the **Navigation bar > Your account name > The account you want to connect**.<br />
1. From the **Navigation bar**, click **<iclass="fa-solid fa-gear"></i> Settings > Source code managers**.
81
-
1. Click **Connect to GitHub**.
85
+
1. Click **Add > GitHub**.
82
86
1. Review the permissions requested by Semgrep, then click **Continue**.
83
87
1. Click the organization you want to install Semgrep on.
84
88
1. Choose to authorize and install Semgrep for **<iclass="fa-regular fa-circle-dot"></i> All repositories** or **<iclass="fa-regular fa-circle-dot"></i> Only select repositories**.
85
89
1. Click **Install and authorize**.
86
90
1. After a successful link, you are signed out of Semgrep AppSec Platform automatically, as your credentials have changed after linking an organization.
87
91
1. Sign back in to Semgrep AppSec Platform.
88
92
89
-
</TabItem>
93
+
### GitHub Cloud with non-GitHub SSO
90
94
91
-
<!-- removed temporarily because we're using the "old flow"
- **Leave PR comments** refers to Semgrep's capability to post findings to developers in PRs.
95
-
:::
95
+
These steps are for users that sign in to Semgrep through a **non-GitHub** SSO provider.
96
+
97
+
1. Navigate to the following link: [<iclass="fas fa-external-link fa-xs"></i> Semgrep GitHub app](https://github.com/marketplace/semgrep-dev) and install the Semgrep GitHub app onto the GitHub org you want to connect to.
98
+
1. Sign in to [<iclass="fas fa-external-link fa-xs"></i> Semgrep AppSec Platform](https://semgrep.dev/login) using SSO.
99
+
1. Optional: If you have created more than one Semgrep account, select the account you want to make a connection for by clicking on the **Navigation bar > Your account name > The account you want to connect**.<br />
1. From the **Navigation bar**, click **<iclass="fa-solid fa-gear"></i> Settings > Source code managers**.
102
+
1. Click **Add > GitHub**.
103
+
1. In the **Name of your GitHub Organization** field, enter the slug of the org that the app was installed on in step 1. For example, if the GitHub URL of your org is `https://github.com/acme-corp`, then the slug is typically `acme-corp`.
104
+
1. Leave the access token field empty.
105
+
1. Click **Connect**.
106
+
1. Your GitHub org is now listed under **Source Code managers**. Click **Test** to verify that the new connection is installed correctly.
107
+
108
+
</TabItem>
96
109
97
-
-->
98
110
99
111
<TabItemvalue='gitlab-cloud'>
100
112
@@ -106,7 +118,7 @@ If you opted to scan a GitHub or GitLab repository when you initially signed in,
106
118
1. Enter the personal access token generated into the **Access token** field.
107
119
1. Enter your GitLab group's name into the **Name of your GitLab Group** field. If your repositories are organized in subgroups, you only need to provide the name of the top-level group.
108
120
1. Optional, but recommended: if you have multiple GitLab groups in your GitLab account, create a source code manager per group. Repeat steps 1, 3-4 for each GitLab group.
109
-
1. The GitLab groups are now listed under **Source code managers**. Click **Test** to verify that the new integration is configured correctly.
121
+
1. The GitLab groups are now listed under **Source code managers**. Click **Test** to verify that the new connection is configured correctly.
110
122
111
123
You have successfully connected an org in Semgrep AppSec Platform with an organization in your source code management tool.
112
124
@@ -135,7 +147,7 @@ You have successfully connected an org in Semgrep AppSec Platform with an organi
135
147
- The **URL** to access your installation of Bitbucket Data Center
136
148
- The **Access Token** that [grants Semgrep permission to communicate with your project](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html). Semgrep expects a [workspace-level access token](https://support.atlassian.com/bitbucket-cloud/docs/create-a-workspace-access-token/)
137
149
2. Click **Connect** to save and proceed.
138
-
3. The Bitbucket project is now listed under **Source code managers**. Click **Test** to verify that the new integration was installed correctly.
150
+
3. The Bitbucket project is now listed under **Source code managers**. Click **Test** to verify that the new connection was installed correctly.
139
151
140
152
</TabItem>
141
153
<TabItemvalue='github-enterprise'>
@@ -214,7 +226,7 @@ Connect Semgrep and GitLab Self-Managed accounts by creating a PAT and providing
214
226
1. Enter your GLSM base URL into the **URL** field.
215
227
1. Enter your GitLab group's name into the **Name of your GitLab Group** field. If your repositories are organized in subgroups, you only need to provide the name of the top-level group.
216
228
1. If you have multiple GitLab groups in your GitLab account, you need to create a source code manager per group. Repeat steps 1, 3-5 for each GitLab group.
217
-
1. The GitLab groups are now listed under **Source Code managers**. Click **Test** to verify that the new integration is installed correctly.
229
+
1. The GitLab groups are now listed under **Source Code managers**. Click **Test** to verify that the new connection is installed correctly.
0 commit comments