Create a Debricked account
Create your Debricked account with ease. Follow this step-by-step guide to have your account up and running in no time.
Last updated
Create your Debricked account with ease. Follow this step-by-step guide to have your account up and running in no time.
Last updated
© 2018-2024 | Open Text
In order to use our service, you need to create a Debricked account. Luckily, this is very easy to do. Simply navigate to our website and click on Start for Free or Log in.
Note that this will create a new company account. If you intend to join an existing company account, please contact your company admin.
To sign up using your email address:
Fill in your email
Read and accept the privacy policy and terms and conditions
Fill in your details
Set a secure password for your account
You can also sign up using your GitHub account:
Click the GitHub button on the Sign-up page
Sign in using your GitHub credentials
Next, you can either choose an organization to connect to, or continue without connecting to an organization. If your company/colleagues already use Debricked, join the existing organization. If you are the first collaborator to join or simply want to use our tool privately, continue without connecting to an organization.
Choose the email address you want to use with your Debricked account and enter your information
Add a password. You will only need it if you have admin rights. It will not be used for logging in via GitHub, but to access the admin pages. You can still use this password to log in if you use your email instead of GitHub SSO, so make sure to choose a secure password.
If you are the first collaborator in our organization to sign up or are not connected to an organization, you get admin rights. Please note that even if you sign up using SSO, we require a password for the admin interface, due to handling of sensitive information.
As an admin, you are allowed to:
Add, remove, or edit users
Manage access tokens
Change user permissions such as:
Allow SSO
Enforce comments when marking vulnerabilities as unaffected
Allow users to snooze vulnerability automations