Zero Trust

Zero Trust integrations

EDAMAME ensures that only devices running its platform—and meeting stringent security and compliance standards—gain access to vital resources such as code repositories, secrets, and test data. By continuously verifying endpoint security at the OS, network, and configuration levels, it enforces Zero Trust principles, granting entry exclusively to secure, trusted devices.

Thanks to EDAMAME’s versatile access control integration engine, it’s simple to configure and customize for your unique environment. Compatible with virtually any REST or GraphQL-supporting API, it seamlessly integrates with existing Zero Trust architectures and access control solutions, including Identity Providers, Application Providers, and Network Access Control systems such as firewalls and VPNs.

Identity

Google Cloud Identity

We integrate with Google Context-Aware Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Google Cloud Identity

We integrate with Google Context-Aware Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Google Cloud Identity

We integrate with Google Context-Aware Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Google Cloud Identity

We integrate with Google Context-Aware Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Microsoft Entra ID

We integrate with Entra ID Conditional Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Microsoft Entra ID

We integrate with Entra ID Conditional Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Microsoft Entra ID

We integrate with Entra ID Conditional Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Microsoft Entra ID

We integrate with Entra ID Conditional Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Application

GitLab

We integrate directly with GitLab's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

GitLab

We integrate directly with GitLab's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

GitLab

We integrate directly with GitLab's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

GitLab

We integrate directly with GitLab's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github

We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github

We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github

We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github

We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Network

Tailscale

We integrate with Tailscale (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Tailscale

We integrate with Tailscale (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Tailscale

We integrate with Tailscale (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Tailscale

We integrate with Tailscale (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird

We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird

We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird

We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird

We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Fortinet Fortigate

We integrate with Fortinet FortiGate, enabling the addition of security posture criteria to control access to both local and cloud resources, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Fortinet Fortigate

We integrate with Fortinet FortiGate, enabling the addition of security posture criteria to control access to both local and cloud resources, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Fortinet Fortigate

We integrate with Fortinet FortiGate, enabling the addition of security posture criteria to control access to both local and cloud resources, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Fortinet Fortigate

We integrate with Fortinet FortiGate, enabling the addition of security posture criteria to control access to both local and cloud resources, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Build your own integration

Our custom access control integration engine is compatible with virtually all APIs that support REST or GraphQL. Give it a try!

Build your own integration

Our custom access control integration engine is compatible with virtually all APIs that support REST or GraphQL. Give it a try!

Build your own integration

Our custom access control integration engine is compatible with virtually all APIs that support REST or GraphQL. Give it a try!

Build your own integration

Our custom access control integration engine is compatible with virtually all APIs that support REST or GraphQL. Give it a try!