Unlike the Cloud version, ZeroThreat On-Prem connects to Trello using an API Key and Token, and operates entirely from within your controlled infrastructure.
ZeroThreat On-Prem requires outbound network access to Trello. Ensure your firewall allows API communication to Trello endpoints.
Before you begin:
- Your target is associated with an Enterprise plan that supports Issue Tracking.
- You have permission in Trello to create cards in the intended board and list.
- Your On-Prem deployment has network access to Trello.
ZeroThreat On-Prem requires a Trello API Key and Token for authentication.
Follow these steps:
- Log in to your Trello account.
- Go to
https://trello.com/power-ups/admin. - Under the Apps section, click New.
- Provide the required details for your app and click Create.
- Once the app is created, open the API Key section.
- Click Generate a new API key.
- Next to the generated API key, click Token to generate a token.
- Authorize the app by clicking Allow.
- Copy and securely save the generated API Key and Token.
The steps above may vary slightly depending on your Trello account or workspace setup. In general, you simply need to generate a Trello API Key and Token from your Trello developer settings.
- Navigate to the Targets (
) section. - Select the target you want to configure and open the Target Configuration page.
- Go to the Issue Tracking (
) section. - Locate Trello and click Configure.
- In the popup, enter your Trello API Key and Trello API Token copied in Step 1.
- Click Save.
Your Trello integration is now connected to the target.
Once Trello is configured:
- Go to the Scans (
) section. - Open a completed scan report.
- Click the Trello Card button at the top of the report.
A Trello configuration popup will appear.
In the Trello popup:
- Select the Workspace.
- Choose the Board where vulnerabilities should be created.
- Select the List where cards should be added.
- Click Submit to proceed.
All cards created from that scan will be added to the selected Trello board and list.
- In the scan report, identify the vulnerability you want to track.
- Click Create Issue.
ZeroThreat will generate individual Trello cards for each finding under that vulnerability.
All cards are immediately pushed to Trello and can be managed directly within your Trello board.
Create Trello cards only for validated and high-priority vulnerabilities to avoid cluttering your boards.
After creating cards:
- Go to Created Issues inside the scan report to see all Trello cards generated.
- Click any card to open it directly in Trello.
Each Trello card includes:
- Detailed vulnerability description
- HTTP request and response evidence
- Proof-of-concept details
- Direct link back to the full ZeroThreat scan report
- Use a dedicated Trello API Key and Token for ZeroThreat integration.
- Rotate tokens periodically as part of your security practices.
- Create cards only for validated vulnerabilities to keep boards manageable.
- Ensure your firewall consistently allows communication to Trello endpoints.
You’re all set with Trello integration on ZeroThreat On-Prem.
Next, explore our other integrations such as GitHub Issues, GitLab Issues, Azure Boards, or Jira — to further streamline your remediation workflows.