Integrate your Bitbucket Server repositories with CloudDefense to gain comprehensive security insights directly from your server's repositories.
Pre-requisites:
You should be signed in with CloudDefense.ai. If not, please refer to our guide on creating a CloudDefense.ai account.
Access to a Bitbucket Server and permissions.
Step 1: Select Bitbucket Server Integration
From your CloudDefense dashboard, navigate to the Integration tab in the navigation bar.
Click on Bitbucket Server under the Source Control section.
Step 2: Provide Server Host Link and Access Token
Host Link:
In the input field Give the host link, provide the host link for your Bitbucket Server.
Here is an example of what a Bitbucket Server host link might look like: https://bitbucket-enterprise.yourcompany.com
Access Token:
To obtain your access token:
Log in to your Bitbucket Server account.
Click on Manage Account from your profile menu in the upper right corner.
Click on HTTP Access Tokens and then click on Create Token in the top right corner.
Fill out the token creation form with a name for the token and click Continue to generate it.!
Important: Copy the token after creating it because you won't be able to view it again later.
Step 3: Configure and Integrate the Account
Once getting above credentials head back to BitBucket Server tab where you'll find the following options available:
Enter your Host Link: Provide the link to your Bitbucket Server host link copied.
Enter your Access Token: Enter the access token you previously generated and copied
After entering the server host link and access token, click the green Configure button.
By following these steps, you'll successfully integrate Bitbucket Server with CloudDefense, enabling advanced security measures and seamless workflow integration.
After setting up your Bitbucket Server integration, you're ready to scan your repositories. For comprehensive instructions on how to initiate scans and view results, please refer to our Scan Repos Documentation. This guide will help you effectively manage and analyze the security of your repositories.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article