@@ -700,6 +700,59 @@ Get the external wiki settings for a project.
...
@@ -700,6 +700,59 @@ Get the external wiki settings for a project.
GET /projects/:id/integrations/external-wiki
GET /projects/:id/integrations/external-wiki
```
```
## GitGuardian
DETAILS:
**Tier:** Premium, Ultimate
**Offering:** SaaS, self-managed
**Status:** Beta
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/435706) in GitLab 16.9 [with a flag](../administration/feature_flags.md) named `git_guardian_integration`. Disabled by default.
FLAG:
On self-managed GitLab, by default this feature is not available. To make it available, an administrator can [enable the feature flag](../administration/feature_flags.md) named `git_guardian_integration`.
On GitLab.com, this feature is not available.
This feature is not ready for production use.
[GitGuardian](https://www.gitguardian.com/) is a cybersecurity service that detects sensitive data such as API keys
and passwords in source code repositories.
It scans Git repositories, alerts on policy violations, and helps organizations
fix security issues before hackers can exploit them.
You can configure GitLab to reject commits based on GitGuardian policies.
This feature is in [Beta](../policy/experiment-beta-support.md#beta) and subject to change without notice.
info:To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
---
# GitGuardian
DETAILS:
**Tier:** Premium, Ultimate
**Offering:** SaaS, self-managed
**Status:** Beta
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/435706) in GitLab 16.9 [with a flag](../../../administration/feature_flags.md) named `git_guardian_integration`. Disabled by default.
FLAG:
On self-managed GitLab, by default this feature is not available. To make it available, an administrator can [enable the feature flag](../../../administration/feature_flags.md) named `git_guardian_integration`.
On GitLab.com, this feature is not available.
This feature is not ready for production use.
[GitGuardian](https://www.gitguardian.com/) is a cybersecurity service that detects sensitive data such as API keys
and passwords in source code repositories.
It scans Git repositories, alerts on policy violations, and helps organizations
fix security issues before hackers can exploit them.
You can configure GitLab to reject commits based on GitGuardian policies.
This feature is in [Beta](../../../policy/experiment-beta-support.md#beta) and subject to change without notice.
To set up the GitGuardian integration:
1.[Create a GitGuardian API token](#create-a-gitguardian-api-token).
1.[Set up the GitGuardian integration for your project](#set-up-the-gitguardian-integration-for-your-project).
## Create a GitGuardian API token
Prerequisites:
- You must have a GitGuardian account.
To create an API token:
1. Sign in to your GitGuardian account.
1. Go to the **API** section in the sidebar.
1. In the API section sidebar go to **Personal access tokens** page.
1. Select **Create token**. The token creation dialog opens.
1. Provide your token information:
- Give your API token a meaningful name to identify its purpose.
For example, `GitLab integration token`.
- Select an appropriate expiration.
- Select the **scan scope** checkbox.
It is the only one needed for the integration.
1. Select **Create token**.
1. After you've generated a token, copy it to your clipboard.
This token is sensitive information, so keep it secure.
Now you have successfully created a GitGuardian API token that you can use to for our integration.
## Set up the GitGuardian integration for your project
Prerequisites:
- You must have at least the Maintainer role for the project.
After you have created and copied your API token, configure GitLab to reject commits:
To enable the integration for your project:
1. On the left sidebar, select **Search or go to** and find your project or group.
1. Select **Settings > Integrations**.
1. Select **GitGuardian**.
1. In **Enable integration**, select the **Active** checkbox.
1. In **API token**, [paste the token value from GitGuardian](#create-a-gitguardian-api-token).
1. Optional. Select **Test settings**.
1. Select **Save changes**.
GitLab is now ready to reject commits based on GitGuardian policies.