GitLab integration
For GitLab Integration a personal access token must include an 'api' scope.
How to create personal access token in GitLab.
GitHub Integration
Go to Settings -> Developer settings -> Personal access tokens and generate personal access token with the following scopes:
- Repo: repo:status, repo:deployment, public_repo, repo:invite, security_events
- Admin:repo_hook: write:repo_hook, read:repo_hook
- User: read:user, user:email
How to create access token in GitHub.
Azure DevOps
- Go to User Settings > Security > Personal Access Tokens
(https://dev.azure.com/{your organization}/_usersSettings/tokens)
2. Create the token with the following scopes:
- Build - Read
- Code - Full ('Full' is required, to post comment to Pull Request with back link to Targetprocess. Also for other automations like create branch from Targetprocess via repo custom fields. If you don't need these additions, then 'Read' access to code will be enough)
- Graph - Read
How to create access token in Azure DevOps
Bitbucket Cloud
- Go to Bitbucket Settings / OAuth. Click Add new consumer.
- Copy the URL from the field below that would be automatically generated for you after you add Bitbucket team URL in Step 1. The URL would look like:
- {your_host}/svc/devops-service/profiles/{your_devOps_profile_id}/auth/callback
- Select the following consumer permissions:
- Account - Write
- Repositories - Admin
- Pull Requests - Write
- Webhooks - Read and Write
- Pipelines - Write
- Under OAuth consumers find your newly created one, expand it, copy values from Key and Secret and paste them to corresponding fields on Targetprocess Bitbucket profile page
Bitbucket Server
- Go to User Settings > Manage account > Personal access tokens and generate a new token with the following permissions:
- Projects - Admin
- Repositories - Admin (inherited)
Still have a question?
We're here to help! Just contact our friendly support team.
Find out more about our APIs, Automation Rules, Mashups and custom extensions.