General Instructions
Description of the process, purpose, and types of integrations (including list of available integrations)
The process of Connecting Perimeters to the SaaS application of your choice or simply put 'Integration', consists of a few simple steps that include (but are not limited to) the following tasks:
Log into Perimeters
Proceed to the Integrations tab
Choose the integration type
Choose the application to be integrated
Fill in the required details like the name of your integration (which acts as an easy identifier in case you choose to integrate multiple instances of the same SaaS application), and credential details, approving the access permissions (scopes) granted.
Additional steps may include the creation of an appropriate token and setting its functional privileges.
Ensuring the successful integration by getting a "Success" status message for the integration.
Integrating the application facilitates and approves Perimeters to carry out the required probe curated to focus on identifying vulnerabilities, misconfigurations, shadow IT, and compliance posture.
Last updated