Azure DevOps integration

Last updated: Mar 30, 2026


Follow these steps to set up Fluid Attacks' integration with Azure DevOps:

  1. Go to your Azure DevOps Organization Settings and ensure it allows third-party application access via OAuth.

    Turn on third-party app access on Azure DevOps to integrate with Fluid Attacks

    Azure allows you to configure certain issue templates with custom fields, some being mandatory. Since the integration is generic, you need to access your project, navigate to Project Settings > Permissions > Project Administrators, and ensure you have the option "Bypass rules on work item updates" set to "Allow" for the integration to function correctly. Also, if you would like to add tags when creating work items from our platform, please verify that the "Create tag definition" setting is also set to "Allow."

    Allow Bypass rules on work item updates on Azure to integrate with Fluid Attacks
  2. On Fluid Attacks' platform, access the Integrations section from the collapsible sidebar.

    Access the Integrations section on the Fluid Attacks platform
  3. Click on Use integration in the Azure DevOps card. If your organization has set up this integration before, the card does not show that button, and you have to click the available gear icon (Settings Icon) instead.

    Use the Azure DevOps integration with the Fluid Attacks platform
  4. Click the Connect button corresponding to the group for which you desire the integration.

    Choose the group to integrate with Azure on the Fluid Attacks platform
  5. Click on Authorize to connect your group to the Azure DevOps account.

    Authorize connection of your group on the Fluid Attacks platform to the Azure account
  6. Read the permissions you give Fluid Attacks with this integration and click the Accept button to agree to them.

    Give Fluid Attacks permission to integrate the platform with Azure
  7. Once redirected to the platform, enter your Azure DevOps organization. This, as well as the project that you have to select next, must correspond to your organization and project configured on your Azure DevOps, respectively.

    Select your Azure organization on the Fluid Attacks platform
  8. Select the specific Azure DevOps project to connect, select the person who will be assigned the vulnerabilities and write any tags to assign to every new issue. Bear in mind that the options available in the Assigned To field are the emails of all those who have access to the project on Azure and not necessarily to the group on Fluid Attacks' platform.

    Provide Azure organization and project names on the Fluid Attacks platform
  9. Click the Update button and you will be all set.

To see the automatically created issues on Azure DevOps, access your project and select Boards and then Work items from the left-side menu.

See work items from vulnerabilities via the Fluid Attacks Azure integration

Inside the issue, you can see the Location and Specific details of reported vulnerabilities related to the weakness in question, among other relevant information. Locations are created as child tasks under the issue, and their titles indicate where the vulnerability was found. As explained in the note under step 1 about avoiding duplicate issues, if an existing issue's title matches the title of the reported finding, the locations are reported under the existing issue instead of creating a new one; the same validation is applied to child tasks.

See issue from vulnerability via the Fluid Attacks Azure integration

On Fluid Attacks' platform, to show you where you are using this integration across your groups, the Azure DevOps card displays how many of the groups you have access to have the integration configured.

Configure Azure DevOps integration on the Fluid Attacks platform