Integrate Supported Shadow Applications
Last updated
Last updated
Perimeters displays the applications that have access to your environment called Shadow Applications. The security team at perimeters also curates the trust profile of these applications that it discovers.
But to make the best use of other available features like misconfigurations, resources, identity, and threats, it is best to integrate such discovered shadow applications that Perimeters supports.
It's easy with an intuitive UI. Just click on '+ Integrate' as shown in the accompanying picture.
This will take you to selected app's Integration Pop-Up with the application specific information and integration guide.