Connected apps
Connected apps are API integrations between Nudge Security and the SaaS tools in your environment. They pull in additional data - like AI agent activity and security misconfigurations - that email-based discovery alone can't surface.
Set up connected apps
Go to Settings > Connected Apps in the left nav. You'll see a list of available integrations. Nudge Security supports 100+ connected apps, and the list is growing.
Look for "Recommended" tags. Nudge Security flags apps it has detected in your environment. Start with those - they're the most likely to add immediate value.
For each connected app, click through to see what data it pulls in. Depending on the app, you may see:
Users - additional accounts and user details beyond what email discovery surfaces.
AI agents - AI-specific usage data for supported tools.
Misconfigurations - security findings like misconfigured settings, excessive permissions, or missing security controls. These appear on the Findings page.
Follow the setup instructions for each app. Most require generating an API key or authorizing an OAuth connection in the target app.
Prioritize these
If you're not sure where to start, connect the apps that cover the largest footprint in your organization first—your identity provider, your primary productivity suite, and any security tools you use. These tend to surface the highest-value data.
Notification settings
Weekly summary email
Go to Settings > Profile and enable the Weekly Summary Email. This sends you a digest each week with:
What's new in your Nudge Security instance (new apps discovered, new accounts, notable activity).
Recent product updates and changelog highlights.
It's a low-effort way to stay current without logging in every day.
Organization and spend settings
Organization settings
Review your organization settings under Settings > Organization to make sure your company name and employee mapping are accurate. This data informs how Nudge Security groups and attributes accounts.
Spend settings
If you plan to use the spend and cost optimization features, go to Settings > Spend to configure:
Currency - set your preferred currency for spend reporting.
Additional mailboxes for spend analysis - We automatically analyze spend for mailboxes associated with known users. You can use this field to include other mailboxes that receive invoices.
Excluded apps - Spend discovery is enabled for all apps by default. You can disable spend discovery for individual apps here. When disabled, any existing spend data for this app will be deleted and will no longer appear in reports or dashboards.
You can skip this now and come back to it when you're ready to tackle cost optimization.
Invite additional team members
Nudge Security isn't just for security teams. Depending on your organization, you may want to invite:
IT team members - for app management, account provisioning, and technical contact duties.
Compliance team members - for audit readiness, vendor management, and policy enforcement.
Finance/Procurement team members - for spend visibility and license optimization.
HR - for onboarding and offboarding workflows.
Go to Settings > Manage users to provide admin permissions for additional users. Each team member gets their own view and can be assigned as a technical contact for specific apps.
You're set up! What's next?
At this point, you've completed the core setup:
Your SaaS estate is defined with approval statuses and technical contacts.
Rules and alerts are in place.
Your workforce is informed (or will be soon).
The browser extension is deployed (or deployment is in progress).
Connected apps are pulling in enriched data.
Now it's time to dig into the use cases that matter most to your organization. Pick the guide that matches your priority:
Your priority | Guide |
Discover and govern new SaaS adoption | Discover and govern shadow IT |
Reduce SaaS spend and eliminate waste | Reduce SaaS spend and optimize costs |
Secure employee onboarding and offboarding | Secure employee onboarding and offboarding |
Accelerate SSO enrollment and MFA coverage | Accelerate SSO and MFA enrollment |
Manage generative AI risk | Manage generative AI risk |
Resolve identity risks and misconfigurations | Resolve identity risks and strengthen SaaS security posture |
Map and reduce your SaaS attack surface | Map and reduce your SaaS attack surface |
You don't have to pick just one—most organizations work on two or three in parallel. But starting with a single focus helps you build momentum before expanding.