Skip to main content

GitGuardian Bridge

GitGuardian Bridge enables secure connections between GitGuardian SaaS and your self-hosted services in private networks without requiring inbound firewall rules or exposing internal resources to the internet.

Built with security at its core, GitGuardian Bridge uses outbound-only connections, mutual TLS authentication, end-to-end encryption, minimal attack surface with distroless container images, and provides complete audit logging for full compliance.

info

Only workspaces under Enterprise plan can use GG Bridge.

What is GitGuardian Bridge?

GitGuardian Bridge creates an encrypted, outbound-only tunnel from your private network to GitGuardian SaaS, allowing you to:

  • Scan private repositories without exposing them to the internet
  • Monitor self-hosted services while maintaining network isolation
  • Meet compliance requirements by keeping sensitive infrastructure private
  • Support multiple networks with separate bridge configurations

Supported Integrations

GitGuardian Bridge works with:

ServiceType
GitHub Enterprise ServerVersion Control
GitLab Enterprise EditionVersion Control
Bitbucket Data CenterVersion Control
Azure DevOps ServerVersion Control
JFrog ArtifactoryContainer Registry
Azure Container RegistryContainer Registry
Confluence Data CenterDocumentation
Microsoft OneDriveDocumentation
Microsoft SharePoint OnlineDocumentation
Jira Data CenterTicketing
ServiceNow (on-premise)Ticketing
Custom webhooksNotifications
Splunk EnterpriseNotifications
Custom validity endpointsSecret Validation
Bring Your Own SourcesCustom Sources

How to Set Up GitGuardian Bridge

Step 1: Request Bridge Access

Contact support@gitguardian.com to request bridge functionality for your account. Specify how many bridges you need (typically one per isolated network segment).

Step 2: Create Your Bridge

  1. Log into GitGuardian Dashboard and navigate to Settings > Security > GitGuardian Bridge
  2. Click "Create Bridge" Create GG Bridge
  3. Configure your bridge: Name your bridge (e.g., "Production Network", "Dev Environment"), optionally add a Custom CA if your internal services use custom certificates, and add domain names of internal services (you can also do this later). Then download the certificate bundle and copy the bridge URL. Configure GG Bridge

Step 3: Configure Bridge Client

Deploy the bridge client in your private network using the certificate bundle and bridge URL from Step 2.

📋 Follow the detailed installation guide: github.com/GitGuardian/ggbridge

The repository provides complete instructions for:

  • Docker deployment
  • Kubernetes/Helm deployment
  • OpenShift configurations
  • Troubleshooting guides

Step 4: Configure URL Mapping (if not done during creation)

If you didn't add domain names during bridge creation, go to your bridge settings and add the domain names of internal services that should route through the bridge:

  • gitlab.internal.company.com
  • bitbucket.team.local
  • artifactory.dev.internal

Configure URL Mapping

GitGuardian will automatically route traffic to these URLs through your bridge.

Step 5: Configure Your Integrations

Set up your self-hosted services in GitGuardian Dashboard:

  1. Sources: Navigate to Settings > Integrations > Sources
  2. Destinations: Navigate to Settings > Integrations > Destinations
  3. Custom Hosts: Navigate to Settings > Secrets > Detectors.

Example with GitHub Enterprise:

Example Sources Integration Settings

When you enter URLs that match your bridge configuration, GitGuardian automatically uses the bridge connection.

Verify Everything Works

  • Bridge Status: Check Settings > Security > GitGuardian Bridge for connection status
  • Integration Health: Monitor your source/destination health checks
  • Test Scans: Run a test scan on a private repository

For assistance, contact support.