Quick Setup Reference
| Integration | Connection Method | Connect |
|---|---|---|
| Okta | OAuth 2.0 + Private Key JWT | Open in dashboard |
| AWS | IAM AssumeRole | Open in dashboard |
| CrowdStrike | API Client credentials | Open in dashboard |
| Datadog | API Key + Application Key | Open in dashboard |
| Wiz | OAuth 2.0 Service Account | Open in dashboard |
| GitHub | GitHub App installation | Open in dashboard |
| Google Workspace | OAuth 2.0 (read-only) | Open in dashboard |
| Slack | OAuth 2.0 | Open in dashboard |
Supported Integrations
Okta
Full read/write accessQuery users, groups, apps, policies, and logs. Suspend users, clear sessions, manage groups.
AWS
Full read/write accessSearch CloudTrail, analyze IAM roles. Terminate instances, disable users, block IPs in WAF.
CrowdStrike
Full read/write accessQuery detections, ingest alerts. Contain hosts, update alert status.
Datadog
Read-onlySearch logs by user, IP, hostname, or custom query. Correlate with other integrations.
Wiz
Read-only + Deep linkingImport cloud security findings. Deep link from Wiz for instant AI analysis.
GitHub
Mostly read-onlyCheck branch protection, query audit logs. Can enable basic branch protection.
Google Workspace
Read-onlyQuery users, groups, devices, login activity, third-party apps. No actions available.
Slack
Alerts and botSend alerts to channels, respond to @mentions. Reset sessions (Enterprise Grid only).
Integration Capabilities
| Integration | Query | Actions | Notes |
|---|---|---|---|
| Okta | Users, groups, apps, logs, policies | Suspend, clear sessions, manage users/groups/apps | Requires admin role + OAuth scopes |
| AWS | CloudTrail, IAM analysis | Terminate EC2, delete IAM users/keys, WAF blocking | Uses IAM AssumeRole |
| CrowdStrike | Detections, host info | Contain/uncontain hosts, update alerts | Auto-ingests detections |
| Datadog | Log search, correlation | None (read-only) | Supports all Datadog sites |
| Wiz | Cloud security issues, CSPM | None (read-only) | Deep linking for instant investigation |
| GitHub | Branch protection, audit logs | Enable branch protection only | Audit logs require Enterprise Cloud |
| Google Workspace | Users, groups, devices, reports | None (read-only) | All scopes are read-only |
| Slack | User info | Reset sessions (Enterprise only), send alerts | Primarily for alerts and bot |
Connecting Integrations
All integrations are managed from Settings > Integrations.Authorize access
Follow the specific setup flow for that integration (OAuth, API credentials, etc.).
Recommended Order
For the best experience, connect integrations in this order:Okta (or Google Workspace)
Identity first. Most investigations involve users, so start with your identity provider.
AWS
Cloud infrastructure. CloudTrail provides rich API logs that Hiro correlates with identity data.
CrowdStrike
Endpoint detection. Hiro automatically ingests detections and correlates with identity and cloud.
Managing Integrations
View Status
Go to Settings > Integrations to see all connected integrations and their status:| Status | Meaning |
|---|---|
| Connected | Working normally |
| Error | Connection issue—click for details |
| Expired | Credentials need refresh |
Disconnect
To remove an integration:- Go to Settings > Integrations
- Click on the integration
- Click Disconnect
Next Steps
Okta
Connect identity management.
AWS
Connect cloud infrastructure.