Zero Trust
Zero Trust integrations
EDAMAME ensures that only devices running its platform—and meeting stringent security and compliance standards—gain access to vital resources such as code repositories, secrets, and test data. By continuously verifying endpoint security at the OS, network, and configuration levels, it enforces Zero Trust principles, granting entry exclusively to secure, trusted devices.
Thanks to EDAMAME’s versatile access control integration engine, it’s simple to configure and customize for your unique environment. Compatible with virtually any REST or GraphQL-supporting API, it seamlessly integrates with existing Zero Trust architectures and access control solutions, including Identity Providers, Application Providers, and Network Access Control systems such as firewalls and VPNs.

Netbird
We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird
We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird
We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird
We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Github
We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github
We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github
We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github
We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.
Identity

Google Cloud Identity
We integrate with Google Context-Aware Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Google Cloud Identity
We integrate with Google Context-Aware Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Google Cloud Identity
We integrate with Google Context-Aware Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Google Cloud Identity
We integrate with Google Context-Aware Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Microsoft Entra ID
We integrate with Entra ID Conditional Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Microsoft Entra ID
We integrate with Entra ID Conditional Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Microsoft Entra ID
We integrate with Entra ID Conditional Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.

Microsoft Entra ID
We integrate with Entra ID Conditional Access, uniquely enabling the addition of security posture criteria to grant or deny access for any device, whether managed or unmanaged.
Application

GitLab
We integrate directly with GitLab's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

GitLab
We integrate directly with GitLab's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

GitLab
We integrate directly with GitLab's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

GitLab
We integrate directly with GitLab's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github
We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github
We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github
We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.

Github
We integrate directly with GitHub Enterprise's Conditional Access, allowing security posture criteria to be enforced for every device—managed or unmanaged—including development machines, test machines, and CI/CD runners. This applies across all authentication methods, whether using credentials, tokens, or SSH keys, and covers all types of interactions with private repositories, including via APIs, CLI (over SSH or HTTPS), the web interface, and mobile applications.
Network

Tailscale
We integrate with Tailscale (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Tailscale
We integrate with Tailscale (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Tailscale
We integrate with Tailscale (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Tailscale
We integrate with Tailscale (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird
We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird
We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird
We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Netbird
We integrate with Netbird (any edition), enabling the addition of security posture criteria to control access to VPN destinations, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Fortinet Fortigate
We integrate with Fortinet FortiGate, enabling the addition of security posture criteria to control access to both local and cloud resources, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Fortinet Fortigate
We integrate with Fortinet FortiGate, enabling the addition of security posture criteria to control access to both local and cloud resources, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Fortinet Fortigate
We integrate with Fortinet FortiGate, enabling the addition of security posture criteria to control access to both local and cloud resources, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Fortinet Fortigate
We integrate with Fortinet FortiGate, enabling the addition of security posture criteria to control access to both local and cloud resources, including critical assets like a GitLab instance, for any device, whether managed or unmanaged.

Build your own integration
Our custom access control integration engine is compatible with virtually all APIs that support REST or GraphQL. Give it a try!


Build your own integration
Our custom access control integration engine is compatible with virtually all APIs that support REST or GraphQL. Give it a try!


Build your own integration
Our custom access control integration engine is compatible with virtually all APIs that support REST or GraphQL. Give it a try!


Build your own integration
Our custom access control integration engine is compatible with virtually all APIs that support REST or GraphQL. Give it a try!





