Create a Debricked account

Create your Debricked account effortlessly. Follow this simple guide to set up your account quickly.

To use our service, you must create a Debricked account. To create a Debricked account, navigate to our website and click Start for Free or Log in.

Sign up with email​​​​​​​

To sign up using your email address:

  1. Type your email address.

  2. Read and accept the privacy policy and terms and conditions.

  3. Type your details.

  4. Type a secure password for your account.

Sign up using GitHub SSO

You can also sign up using your GitHub account:

  1. Click the GitHub button on the Sign-up page.

  2. Sign in using your GitHub credentials.

  3. Next, you can either choose to connect to an organization or continue without one. If your company or colleagues already use Debricked, please join the existing organization. If you are the first collaborator to join or prefer to use our tool privately, you can opt to continue without connecting to an organization.

  4. Choose the email address you want to use with your Debricked account and enter your information.

  5. Create a password. This password is necessary only if you have administrative rights. It will not be used for logging in through GitHub; instead, it will be required to access the admin pages. You can also use this password if you choose to log in with your email instead of using GitHub Single Sign-On (SSO). Therefore, make sure to create a secure password.

Administrator role

If you are the first collaborator to sign up in our organization or if you are not associated with any organization, you will receive admin rights. Even if you sign up using Single Sign-On (SSO), you will still need to create a password for the admin interface due to handling of sensitive information.

As an administrator, you are allowed to:

  • Add, remove, or edit users

  • Manage access tokens

  • Change user permissions such as:

    • Allow SSO

    • Enforce comments when marking vulnerabilities as unaffected

    • Allow users to snooze vulnerability automations

Last updated

Was this helpful?