Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table of Contents

General Information

JFrog Xray works with JFrog Artifactory to perform universal analysis of binary software components at any stage of the application lifecycle. 

The WhiteSource Xray integration is a vulnerability feed that can be easily integrated with your Xray account.

...

Info

Your organization API key is available on the Integrate tab of your WhiteSource account, under Integration.

Image Removed

Setting Up the WhiteSource Integration

  1. Login to JFrog Xray with administrator permissions. From the main menu, select

    Admin →

    Admin > Configuration

    → Integrations

    > Integrations.

    Image Modified

  2. The integration pop-up window appears. Select the WhiteSource icon from the integration list, and enter the WhiteSource API key in the 'API Token' field.

    Image RemovedImage Added


    The test URL

    is 

    is https://saas.whitesourcesoftware.com/xray/api/checkauth

     or

     or in Azure

    EU 

    EU https://app-eu.whitesourcesoftware.com/xray/api/checkauth

Info

The URL for an on-premises deployment is the on-

...

premises installation URL.

Testing & Saving the Integration

  1. Click

    on

    the

    '

    Test

    '

    button to validate that the integration is configured properly. A confirmation message should appear indicating that the API key is valid.

    Image Modified

  2. Click

    on the '

    Save

    ' button

    .

Viewing Security Vulnerabilities

Once integrated, Xray starts pulling data from WhiteSource based on your watches (rules).

WhiteSource provides all relevant information about security vulnerabilities (severity, impacted versions and actionable remediation suggestions), and known severe software bugs for each of the displayed open source components. To view vulnerabilities: 

  1. Go to the Security tab of a specific package as displayed in the following screenshot:

    Image RemovedImage Added

  2. Select a specific component in order to view details on the security vulnerability.

    Image Modified