GitLab Integration Setup
This guide walks you through connecting GitLab to RAD Security, enabling application security scanning and vulnerability findings across your GitLab instance or groups.Prerequisites
Before you begin, ensure you have:Access to the web interface of your GitLab instance
GitLab instance administrator access or an account with the Owner role (recommended)
Access to RAD Security workspace with integration permissions
Required Token Scopes
The GitLab integration requires the following API token scope:| Operation | Required Scope |
|---|---|
| Query Applications | read_api |
| Query Application Findings | read_api |
| Query findings across all applications | read_api |
| Get Application Finding Details | read_api |
Only the
read_api scope is required. This provides read-only access to the API, including all groups and projects, the container registry, and the package registry.Generating an API Access Token
GitLab supports three methods for creating API access tokens. The recommended method is using a service account, but service accounts are not available on GitLab Free instances. If you’re using GitLab Free, use a group access token instead.- Service Account (Recommended)
- Group Access Token
- Personal Access Token
Service accounts provide the most secure option for integrations as they are not tied to individual users.For more information, see the GitLab service accounts documentation.
Instance-Wide Service Account
1
Access Admin Settings
Log into your GitLab instance and select Admin from the left sidebar.
2
Navigate to Service Accounts
Select Settings > Service accounts.
3
Create Service Account
Click Add service account and fill out the required fields to create a new instance-wide service account.
4
Manage Access Tokens
Click the vertical ellipsis (⋮) to the right of the new service account and select Manage access tokens.
5
Create the Token
Proceed to Creating the Access Token below.
Group Service Account
1
Navigate to Your Group
Go to the group where you want to create the service account.
2
Access Service Account Settings
Select Settings > Service accounts from the left sidebar.
3
Create Service Account
Click Add service account and fill out the required fields.
4
Manage Access Tokens
Click the vertical ellipsis (⋮) to the right of the new service account and select Manage access tokens.
5
Create the Token
Proceed to Creating the Access Token below.
Creating the Access Token
Once you’re on the new API access token creation screen:1
Configure Token Details
Fill out the following fields:
- Token name: A descriptive name (e.g., “RAD Security Integration”)
- Description (optional): Purpose of the token
- Expiration date: Set according to your security policies
2
Select Scopes
Under the Select scopes section, check the box next to:
read_api
3
Create Token
Click Create token.
4
Save Token
Copy the token immediately — it will not be shown again.
https://gitlab.com or https://gitlab.yourcompany.com). You’ll need this when configuring the integration.
Configure in RAD Security
Once you have your token, configure the integration in RAD Security:1
Navigate to Integrations
Go to your RAD Security workspace and navigate to Integrations.
2
Add GitLab Integration
Click Add Integration and select GitLab from the available options.
3
Enter Configuration
Fill in the required fields:
| Parameter | Description | Example |
|---|---|---|
| Integration Name | A descriptive name for this integration | GitLab Production |
| Secret | The API access token you generated | glpat-xxxxxxxxxxxx |
| Base URL | The URL of your GitLab instance | https://gitlab.com |
4
Save and Test
Click Save to create the integration. RAD Security will validate the connection.
Your token is encrypted and stored securely by RAD Security.
Verify Integration
After completing the setup, verify your integration is working:- Navigate to Integrations in your RAD Security workspace
- Locate your GitLab integration
- Check the connection status shows as Active
- Verify applications and findings are being discovered
Your GitLab integration is now configured! RAD Security will begin syncing application security data from your GitLab instance.
What Data is Synced
Applications
Applications
- Projects and repositories within your GitLab instance or group
- Application metadata and configurations
Security Findings
Security Findings
- SAST (Static Application Security Testing) findings
- DAST (Dynamic Application Security Testing) findings
- Dependency scanning results
- Container scanning results
- Secret detection findings
Finding Details
Finding Details
- Vulnerability severity and classification
- Affected files and line numbers
- Remediation guidance
- Finding status (detected, confirmed, dismissed)
Use Cases
Centralized Vulnerability View
Aggregate security findings from GitLab alongside other security tools for a unified view.
Security Posture Tracking
Track application security trends over time across all GitLab projects.
Compliance Reporting
Generate compliance reports that include GitLab security scanning results.
Risk Prioritization
Correlate GitLab findings with other data sources to prioritize remediation efforts.
Troubleshooting
Connection Failed
Connection Failed
- Verify your access token is correct and hasn’t expired
- Ensure the token has the
read_apiscope - Check that the Base URL is correct and accessible
- For self-hosted GitLab, verify network connectivity from RAD Security
No Applications Found
No Applications Found
- Confirm the token has access to the groups/projects you expect
- For group tokens, verify the token is scoped to the correct group
- Check that the service account or user has appropriate role assignments
Missing Security Findings
Missing Security Findings
- Verify that GitLab security scanning is enabled for your projects
- Check that CI/CD pipelines with security jobs have run successfully
- Ensure the token user/service account has access to security reports
Token Expired
Token Expired
- Generate a new token following the steps above
- Update the integration in RAD Security with the new token
- Consider setting longer expiration dates or using calendar reminders for rotation
Security Best Practices
Use Service Accounts
Create dedicated service accounts rather than using personal tokens to avoid disruption when team members leave.
Minimal Scope
Only grant the
read_api scope required for the integration. Avoid granting write permissions.Rotate Tokens Regularly
Set appropriate expiration dates and rotate tokens according to your security policies.
Audit Token Usage
Regularly review service account and token activity in GitLab’s audit logs.
Token Rotation
To rotate your GitLab access token:1
Generate New Token
Create a new token following the steps above with the same scope.
2
Update RAD Security
Edit your GitLab integration in RAD Security and update the Secret field.
3
Verify Connection
Confirm the integration status remains Active after the update.
4
Revoke Old Token
Delete the old token from GitLab to complete the rotation.