3rd Party Integrations

OX integrates with a wide range of third-party systems to collect security signals, enrich findings with contextual data, and reflect how your applications are built, deployed, and operated in practice.

Integrations allow OX to connect to source control systems, CI/CD platforms, cloud providers, container registries, and security tools, and to correlate data across them into a single application-centric security view.

What integrations enable

By connecting third-party systems to OX, you enable the platform to:

  • Discover applications, repositories, and workloads automaticallyIngest findings from multiple security sources

  • Enrich issues with build, runtime, and ownership context

  • Track risk across the full application lifecycle

Integrations are the foundation for accurate prioritization, policy evaluation, and end-to-end visibility.

Integration models in OX

OX supports multiple integration models to accommodate different environments and security requirements.

Some integrations connect directly to external SaaS platforms. Others connect to internal systems running in private or restricted environments.

The available integration model depends on the system you are connecting and how your environment is deployed.

Authentication and connectivity

Each integration uses a defined connection method that determines how authentication, permissions, and network access are handled.

Common connection methods include managed App integrations, identity-based authentication, direct API tokens, and broker-based connectivity for restricted environments.

For an overview of available connection methods and guidance on choosing the right one, see Connection Methods.

Connector-specific configuration

While the integration concepts are consistent, each connector has its own configuration requirements based on the third-party system it connects to.

Connector setup pages describe:

  • Supported connection methods

  • Required permissions or scopes

  • Environment prerequisites

  • Connector-specific behavior and limitations

Not all connectors support all connection methods.

How to get started

Start by identifying which third-party systems are part of your development and deployment workflow. Then, choose the appropriate connector and connection method based on your environment and security requirements.

Last updated