About integrating components with Application Security
The following table lists the components you can integrate with Application Security.
| Component | Integration instructions |
|---|---|
| Security training vendors | Configuring application security training |
|
OpenText™ Fortify Audit Assistant |
Configuring Fortify Audit Assistant |
|
Java Message Service (JMS) |
Configuring Java Message Service settings |
|
LDAP servers |
Configuring LDAP Servers |
|
System for Cross-domain Identity Management (SCIM) |
|
| OpenText ScanCentral DAST | Enabling the running and management of OpenText ScanCentral DAST scans |
| Fortify ScanCentral SAST | Enabling integration with Fortify ScanCentral SAST |
|
Single sign-on (SSO) |
About configuring Application Security to work with single sign-on |
| Bug tracking systems | About bug tracking system integration |
| Software composition analysis | |
| OpenText Application Security Tools | |
|
Fortify Audit Workbench |
|
|
OpenText™ Fortify Plugin for Eclipse |
|
|
OpenText™ Fortify Extension for Visual Studio |
|
|
OpenText™ Fortify Analysis Plugin for IntelliJ IDEA and Android Studio |
OpenText™ Fortify Analysis Plugin for IntelliJ IDEA and Android Studio User Guide |
|
OpenText™ Fortify Jenkins Plugin |
|
|
OpenText™ Fortify Extensions for Visual Studio Code |
|
|
OpenText™ Fortify Remediation Plugin for Eclipse |
OpenText™ Fortify Remediation Plugin for Eclipse User Guide |
|
OpenText™ Fortify Remediation Plugin for IntelliJ IDEA and Android Studio |
OpenText™ Fortify Remediation Plugin for IntelliJ IDEA and Android Studio User Guide |
|
OpenText™ Fortify Azure DevOps Extension |
Fortify Azure DevOps Extension User Guide |
If you integrate Application Security with other components, ensure that you minimize clock skew between communicating machines. OpenText recommends that you synchronize computer clock times using, for example, Network Time Protocol (NTP). If that is not possible, OpenText suggests that you maintain a clock skew of less than five minutes, compared on a UTC basis. Otherwise, communication requests to Application Security can fail.