The line-item directory of every connector Safeguard ships. Categorised by what they connect to — SCM, CI/CD, ticketing, comms, oncall, SIEM, identity, cloud, secret managers, registries — with the auth mechanism and the GA/Beta status of each one.
Looking for higher-level capability categories? See /integrations. For the cloud-and-SCM focused matrix, see /cloud-providers.
Pull repos, post PR comments, gate merges, and verify signed commits across every code host you use.
Auth: GitHub App + OAuth
Auth: GitHub App
Auth: OAuth + project token
Auth: OAuth + project token
Auth: OAuth
Auth: Personal access token
Auth: OAuth + PAT
Auth: Token
Receive build events, post status checks, and run policy gates at the right step in your pipeline.
Auth: OIDC
Auth: OIDC
Auth: Plugin + token
Auth: Orb + OIDC
Auth: OIDC
Auth: Service connection
Auth: Sync hook + OIDC
Auth: GitOps hook
Auth: Webhook
Open, update, and close tickets — with finding context as ticket metadata, not free-text in a description.
Auth: OAuth 2.0
Auth: PAT
Auth: OAuth
Auth: OAuth + REST
Auth: OAuth
Auth: GitHub App
Auth: API token
Alerts, approvals, and triage workflows in the channels your team already inhabits.
Auth: OAuth (workspace install)
Auth: Entra OAuth
Auth: Bot token
Auth: API key
Auth: Signed HMAC
Escalate stale critical findings up your existing oncall rotation. Pages happen in the system that already wakes people up.
Auth: OAuth + integration key
Auth: API key
Auth: OAuth
Auth: REST integration
Ship findings, audit events, and platform metrics into the SIEM and observability backends that already see your traffic.
Auth: HEC token
Auth: API key
Auth: API key
Auth: HTTP source
Auth: Log Analytics
Auth: Service account
Auth: API key
Single sign-on plus user and group provisioning through the IdP your enterprise already runs.
Auth: OIDC + SCIM
Auth: OIDC + SCIM
Auth: OIDC + SCIM
Auth: OIDC + SCIM
Auth: OIDC + SCIM
Auth: SAML 2.0
Auth: SAML metadata
Read inventory, fetch SBOMs from registries, and gate IaC plans against the live state of your cloud accounts.
Auth: IAM role + STS
Auth: Workload identity
Auth: Workload identity federation
Auth: OCI auth
Auth: API token
Auth: API token
Pull deployment-time secrets from the vault you already trust. No new secret to manage just to manage secrets.
Auth: AppRole + JWT
Auth: IAM role
Auth: Workload identity
Auth: Workload identity federation
Auth: Service token
Auth: Service token
Scan, sign, and pull from the registries that hold your build output. No mandatory rehosting.
Auth: IAM role
Auth: Workload identity
Auth: Workload identity federation
Auth: API token
Auth: API token + OIDC
Auth: User token
Auth: GitHub App
Auth: Robot account
The connector contract is a typed manifest plus a signed runtime. Build one yourself, sponsor one with us, or browse community-submitted plugins in the plugin marketplace.
Walk through your connector list with us. Every connector you already need is in this directory; the ones that aren't are usually a week away.