Integration
In the Integration Page you can manage the different access keys, secrets and tokens that are linked to the user’s profile. This includes Code Repository Tokens, Personal SSH Identity and GPG Keys. The keys and tokens are used to authenticate and authorize access to different services, such as remote repository applications. By managing their keys, tokens and secrets in one location, users can easily keep track of which ones are being used, for what purpose and can revoke or add new ones as needed. The page also allows the user to view, create, and remove them, to manage access levels and to have an overview of their expiration date. This helps to ensure that only authorized users have access to the necessary resources and services, and that access is revoked when necessary.
Code Repository Tokens
Under Code Repository Tokens, you can configure authentication, using OAuth Authentication Tokens or Personal SSH Keys, to the following git providers:
- GitHub,
- GitLab,
- and Bitbucket. For certain of these git providers, you have the option to choose between the ‘Default’ or ‘Internal’ options. An ‘Internal Service’ is self-hosted, whereas a ‘Default Service’ is hosted on the cloud.

Personal SSH Identity
Use the Personal SSH identity option to authenticate with external resources over SSH.
To set this up, select Generate Key. The system creates a public/private key pair and displays the public key. Add this public key to your external SSH service as an authentication option. When you access the external service, SDS automatically applies the private key to your session. This eliminates the need for manual key management and prevents malicious code in the workspace from extracting the key. Note: The SSH key applies to both new and existing workspaces.
Important:
To connect to SSH services, you must either configure a personal SSH identity or set up the SSH service as a project resource.

GPG Keys
You can generate and automatically deploy GPG keys to authenticate your commits on supported Git repository applications (i.e. GitHub).

Citrix Integration
The Citrix Integration section on the Integrations page lets you sign in to your Citrix account to access Citrix DaaS virtual apps and desktops directly from the SDS console. After you sign in, your assigned Citrix resources appear on the project Overview page.
This section is available at Profile > Integrations > Citrix Integration.

Prerequisites
- Your SDS platform administrator must first configure the Citrix DaaS integration under System Configuration > Integrations > Citrix DaaS Integration. See Citrix DaaS Integration.
- You need a Citrix Workspace account with virtual apps or desktops assigned to you.
Sign in to Citrix
- Go to Profile > Integrations.
- In the left sidebar, select Citrix Integration.
- Under Sign In to Citrix Using OAuth Token, select Sign In.
- Complete the authentication in the Citrix Workspace sign-in dialog that opens.
After you sign in, the page displays your sign-in timestamp and a Sign Out button.

Select DaaS resources
After you sign in, a Selected DaaS Resources section appears below the sign-in area. Use this section to choose which Citrix virtual apps and desktops you want to access from the SDS console.
- Select Edit next to Selected DaaS Resources.
- In the Add Citrix DaaS Resource dialog, browse or search for available resources.
- Select one or more resources from the list.
- Select Apply.
The selected resources now appear under Selected DaaS Resources on this page and in the Citrix DaaS Resources section on the project Overview page.


Launch Citrix resources
After you select resources, they appear on the project Overview page under Citrix DaaS Resources. Select a resource to launch it. See Citrix DaaS Resources.
Sign out
To disconnect your Citrix account, return to Profile > Integrations > Citrix Integration and select Sign Out. Your selected Citrix DaaS resources will no longer appear on the project Overview page.