In this guide, we’ll walk through how to set up the integration using a basic example. You can follow along with the example, or customize the steps to fit your own Azure DevOps workflow.
Before you begin:
- Make sure your target is verified in ZeroThreat.
- You have an Azure DevOps project with pipeline permissions.
- You’re familiar with the basics of Azure and Azure Pipelines.
- Your source code repository is connected to Azure (e.g., GitHub, Bitbucket, or Azure Repos).
- Navigate to the Targets (
)section in ZeroThreat. - Click on the "Continuous Integration" button (
) for your desired target.
- In the CI/CD settings drawer, enable Azure Pipelines integration and confirm.
Once confirmed, a unique ZT_TOKEN will be generated. This token is used to start scans CI/CD for its associated target from the CI/CD.
- Select or create a Scan Profile suitable for your environment.
- If you're scanning authenticated sections of your app, select the appropriate Login Template for authenticated scans.
Make sure to select a appropriate working Login template for Authenticated Scan.
Click on the Azure Pipelines icon in ZeroThreat to open the Azure DevOps Marketplace, where you’ll find the official ZeroThreat AI DAST Scanner from Marketplace.
- Open your Azure DevOps Project.
- Go to Pipelines → Create Pipeline.
- In this guide, we’ll use the Classic Editor (
) for setup clarity. Choose your project source, connect your repository, and select the relevant branch or build definition. - When prompted to choose a template, you can select a recommended one or click “Empty Job” to build from scratch.
- Create a new Agent Job and name it.
- Select an Agent Pool and Agent Specification (e.g.,
ubuntu-latest
or your default pool).
- Click “Save and Queue” to create the pipeline structure.
- Search for ZeroThreat AI DAST Scanner in the task list.
- Add it to the Agent Job.
- Provide your ZT_TOKEN (the one generated in ZeroThreat).
- Set Wait for Analysis to
true
or false
:
false
(default): The scan starts and the pipeline moves on.true
: The pipeline waits for the scan to complete before proceeding.
Best Practice:
Store your ZT_TOKEN
securely in Azure DevOps as a pipeline variable or secret to avoid exposing it in your build logs or version control.
- Once everything is configured, click “Save and Queue”.
- The Agent Job will start, and you'll see the scan triggered in real-time in your ZeroThreat dashboard.
The above setup is a basic example using a manual trigger and the classic editor, but you can easily customize it to fit your workflow:
- Trigger scans automatically on every push, pull request, or tag
- Schedule scans at regular intervals using cron expressions
- Include scan stages in larger workflows for build → test → security → deploy pipelines
This flexibility ensures you can integrate security testing exactly when and where it makes sense in your CI/CD process.