diff --git a/src/pages/explanations/integrations/external-entity-providers.mdx b/src/pages/explanations/integrations/external-entity-providers.mdx
index d52fe72..83b3933 100644
--- a/src/pages/explanations/integrations/external-entity-providers.mdx
+++ b/src/pages/explanations/integrations/external-entity-providers.mdx
@@ -1,8 +1,84 @@
import Image from 'next/image';
-import { Callout } from 'nextra/components';
+import { Callout, Steps } from 'nextra/components';
import { Tooltip, TooltipTrigger, TooltipContent } from "@/components/ui/tooltip";
-import PageContentComingSoon from '@/components/PageContentComingSoon'
# External Entity Providers
-
\ No newline at end of file
+External Entity Providers allow DevGuard to synchronize organizational structure and permissions from external platforms like GitLab. Instead of manually creating organizations, projects, and assets in DevGuard, you can import them directly from your existing infrastructure.
+
+## Overview
+
+External Entity Providers enable:
+
+- **Automatic Organization Creation**: GitLab instances become DevGuard organizations
+- **Project Synchronization**: GitLab groups map to DevGuard projects
+- **Asset Discovery**: GitLab projects map to DevGuard assets
+- **Permission Inheritance**: External access levels translate to DevGuard roles
+- **Real-time Sync**: Permissions update when users authenticate
+- **Issue Management**: Vulnerabilities can be tracked in the same platform
+
+
+
+## Entity Mapping
+
+| External Entity | DevGuard Entity |
+|-----------------|-----------------|
+| GitLab Instance | Organization |
+| GitLab Group | Project |
+| GitLab Project | Asset |
+
+
+## Synchronization Process
+
+When a user authenticates via an external provider:
+
+1. **Token Retrieval**: DevGuard retrieves OAuth2 tokens from the identity provider
+2. **Organization Sync**: Organizations are created/updated based on the provider
+3. **Project Sync**: GitLab groups are synchronized as DevGuard projects
+4. **Asset Sync**: GitLab projects within groups are synchronized as DevGuard assets
+5. **Permission Sync**: User roles are updated based on external permissions
+
+## Permission Synchronization
+
+| GitLab Access Level | DevGuard Role |
+|---------------------|---------------|
+| Owner / Maintainer | Admin |
+| Developer / Reporter / Guest | Member |
+
+When external permissions change, DevGuard:
+
+- **Revokes Old Roles**: Removes access to projects/assets the user no longer has access to
+- **Grants New Roles**: Adds access based on current external permissions
+- **Updates Existing Roles**: Adjusts role levels if permissions changed
+
+## Triggering Sync
+
+### Automatic Sync
+
+Synchronization occurs automatically when:
+- Users authenticate via the external provider
+- Users access an organization linked to an external entity
+
+### Manual Sync
+
+Users can trigger a manual sync via the DevGuard UI or API endpoints.
+
+
+## Benefits
+
+- **Single Source of Truth**: Permissions are managed in your existing platform
+- **Reduced Administration**: No need to manually create DevGuard entities
+- **Automatic Updates**: Changes in external systems reflect in DevGuard
+- **Consistent Access**: Users have the same access levels across platforms
+
+## Limitations
+
+- **Provider Support**: Currently limited to GitLab
+- **Token Validity**: Requires valid OAuth2 tokens for sync
+
+
+## Related Documentation
+
+- [GitLab Integration](/explanations/integrations/gitlab-integration) — GitLab-specific integration details
+- [GitLab Permission Sync](/how-to-guides/integrations/gitlab/permission-sync) — Configure permission synchronization
+- [Integration Architecture](/explanations/integrations/integration-architecture) — Overall integration design
\ No newline at end of file
diff --git a/src/pages/explanations/integrations/github-integration.mdx b/src/pages/explanations/integrations/github-integration.mdx
index bf01555..2e82d6b 100644
--- a/src/pages/explanations/integrations/github-integration.mdx
+++ b/src/pages/explanations/integrations/github-integration.mdx
@@ -1,8 +1,75 @@
import Image from 'next/image';
-import { Callout } from 'nextra/components';
+import { Callout, Steps, Tabs } from 'nextra/components';
import { Tooltip, TooltipTrigger, TooltipContent } from "@/components/ui/tooltip";
-import PageContentComingSoon from '@/components/PageContentComingSoon'
# GitHub Integration
-
\ No newline at end of file
+DevGuard integrates with GitHub through a **GitHub App**, providing secure access to your repositories for issue management.
+
+## Overview
+
+The GitHub integration provides:
+
+- **Repository Access**: List and import repositories from GitHub organizations
+- **Issue Management**: Create and update GitHub Issues for discovered vulnerabilities
+- **Webhook Processing**: React to issue changes and comments in real-time
+- **CI/CD Integration**: Automated scanning via GitHub Actions
+
+
+ The GitHub App enables secure repository access and manages webhooks for issue tracking. Vulnerability scanning is authenticated separately using a DevGuard Token (Personal Access Token, PAT).
+
+
+
+
+## How It Works
+
+1. **Configure Integration**: Add the DevGuard GitHub App to your GitHub organization
+2. **Link Asset**: Connect a DevGuard asset to a GitHub repository
+3. **Create Issues**: Vulnerabilities can be pushed to GitHub Issues for tracking (automatically or manually)
+4. **Sync Status**: Changes in either system are synchronized via webhooks
+
+
+## Issue Creation
+
+When a vulnerability is flagged for remediation, DevGuard creates a GitHub issue containing detailed information about the vulnerability, including severity, affected components, and labels for categorization.
+
+## Comment Commands
+
+Users can control vulnerability status through issue comments:
+
+| Command | Effect |
+|---------|--------|
+| `/accept ` | Accept the vulnerability risk |
+| `/false-positive ` | Mark as false positive |
+| `/reopen` | Reopen a closed vulnerability |
+
+
+ Only repository collaborators can use these commands. DevGuard verifies permissions before processing.
+
+
+
+
+### Processed Events
+
+| Event | Action |
+|-------|--------|
+| Issue Closed | Vulnerability marked as accepted |
+| Issue Reopened | Vulnerability reopened |
+| Issue Deleted | Vulnerability marked as false positive |
+| Comment Added | Process slash commands |
+
+## Issue State Synchronization
+
+| GitHub Action | DevGuard Interpretation |
+|---------------|-------------------------|
+| Close issue | Vulnerability accepted |
+| Reopen issue | Vulnerability reopened |
+| Delete issue | Vulnerability false positive |
+
+
+## Related Documentation
+
+- [Setup GitHub Integration](/how-to-guides/integrations/github/setup-github-integration) — Step-by-step setup guide
+- [GitHub Webhooks](/how-to-guides/integrations/github/webhooks) — Configure webhooks
+- [GitHub Auto-Setup](/how-to-guides/integrations/github/auto-setup) — Automated repository configuration
+- [Scan with GitHub Actions](/how-to-guides/scanning/scan-with-github-actions) — CI/CD integration guide
\ No newline at end of file
diff --git a/src/pages/explanations/integrations/gitlab-integration.mdx b/src/pages/explanations/integrations/gitlab-integration.mdx
index bdc4398..b21a332 100644
--- a/src/pages/explanations/integrations/gitlab-integration.mdx
+++ b/src/pages/explanations/integrations/gitlab-integration.mdx
@@ -1,8 +1,92 @@
import Image from 'next/image';
-import { Callout } from 'nextra/components';
+import { Callout, Steps, Tabs } from 'nextra/components';
import { Tooltip, TooltipTrigger, TooltipContent } from "@/components/ui/tooltip";
-import PageContentComingSoon from '@/components/PageContentComingSoon'
# GitLab Integration
-
\ No newline at end of file
+DevGuard integrates with GitLab through two authentication methods: **Personal Access Token (PAT)** or **OAuth2**. Both methods support gitlab.com and self-hosted GitLab instances.
+
+| Method | Use Case |
+|--------|----------|
+| **Personal Access Token** | Repository access, issue management |
+| **OAuth2** | Permission sync, External Entity Provider |
+
+
+ This page covers the **Personal Access Token** integration. For OAuth2-based integration, see [External Entity Providers](./external-entity-providers).
+
+
+## Overview
+
+The GitLab PAT integration provides:
+
+- **Repository Access**: List and import GitLab projects
+- **Issue Management**: Create and update GitLab Issues for vulnerabilities
+- **Webhook Processing**: React to issue and note events in real-time
+- **CI/CD Integration**: Automated scanning via GitLab CI/CD pipelines
+
+
+ The GitLab PAT enables secure repository access and manages webhooks for issue tracking. Vulnerability scanning is authenticated separately using a DevGuard Token (Personal Access Token, PAT).
+
+
+## How It Works
+
+1. **Configure Integration**: Add your GitLab instance URL and Personal Access Token in DevGuard
+2. **Link Asset**: Connect a DevGuard asset to a GitLab project
+3. **Create Issues**: Vulnerabilities can be pushed to GitLab Issues for tracking (automatically or manually)
+4. **Sync Status**: Changes in either system are synchronized via webhooks
+
+
+## Issue Creation
+
+When a vulnerability is flagged for remediation, DevGuard creates a GitLab issue containing detailed information about the vulnerability, including severity, affected components, and labels for categorization.
+
+## Comment Commands
+
+Users can control vulnerability status through issue comments:
+
+| Command | Effect |
+|---------|--------|
+| `/accept ` | Accept the vulnerability risk |
+| `/false-positive ` | Mark as false positive |
+| `/reopen` | Reopen a closed vulnerability |
+
+## Webhook Processing
+
+DevGuard processes GitLab webhooks to synchronize issue state changes.
+
+
+ Configure the webhook secret in your GitLab settings to ensure only authenticated requests are processed. DevGuard only accepts webhooks with a valid secret.
+
+
+### Processed Events
+
+| Event | Action |
+|-------|--------|
+| Issue Closed | Vulnerability marked as accepted |
+| Issue Reopened | Vulnerability reopened |
+| Comment Added | Process slash commands |
+
+## Issue State Synchronization
+
+| GitLab Status | DevGuard Interpretation |
+|---------------|-------------------------|
+| Open | Open vulnerability |
+| Closed | Closed vulnerability |
+
+## Self-Hosted Instances
+
+GitLab integration fully supports self-hosted GitLab instances:
+
+- Configure your GitLab instance URL in the OAuth2 or Access Token settings
+- Multiple GitLab instances can be connected simultaneously
+- Each instance is treated as a separate External Entity Provider
+
+## Testing the Integration
+When saving a new GitLab integration, DevGuard performs a test connection to validate the provided credentials and permissions. If the test fails, an error message will indicate the issue.
+
+## Related Documentation
+
+- [Setup GitLab Integration](/how-to-guides/integrations/gitlab/setup-gitlab-integration) — Step-by-step setup guide
+- [GitLab Permission Sync](/how-to-guides/integrations/gitlab/permission-sync) — Configure permission synchronization
+- [GitLab Webhooks](/how-to-guides/integrations/gitlab/webhooks) — Configure webhooks
+- [External Entity Providers](/explanations/integrations/external-entity-providers) — Understanding external entities
\ No newline at end of file
diff --git a/src/pages/explanations/integrations/integration-architecture.mdx b/src/pages/explanations/integrations/integration-architecture.mdx
index bde556b..35902a4 100644
--- a/src/pages/explanations/integrations/integration-architecture.mdx
+++ b/src/pages/explanations/integrations/integration-architecture.mdx
@@ -1,8 +1,98 @@
import Image from 'next/image';
-import { Callout } from 'nextra/components';
+import { Callout, Cards, Card } from 'nextra/components';
import { Tooltip, TooltipTrigger, TooltipContent } from "@/components/ui/tooltip";
-import PageContentComingSoon from '@/components/PageContentComingSoon'
# Integration Architecture
-
\ No newline at end of file
+DevGuard is designed as a flexible and extensible platform that integrates with a wide variety of security tools, code hosting platforms, and issue tracking systems. The architecture is built around a core API that allows for seamless integration with third-party services.
+
+## Overview
+
+DevGuard's integration architecture serves two primary purposes:
+
+1. [**Finding Vulnerabilities**](#finding-vulnerabilities): Integrate with your code repositories and CI/CD pipelines to automatically scan code for vulnerabilities
+2. [**Managing Vulnerabilities**](#managing-vulnerabilities): Track and manage discovered vulnerabilities in your preferred issue tracking system
+
+```mermaid
+graph TB
+ subgraph "Code Hosting Platforms"
+ GH[GitHub]
+ GL[GitLab]
+ end
+
+ subgraph "DevGuard"
+
+ end
+
+ subgraph "Issue Tracking"
+ GHI[GitHub Issues]
+ GLI[GitLab Issues]
+ JIRA[Jira]
+ end
+
+ GH --> DevGuard
+ GL --> DevGuard
+ DevGuard --> GHI
+ DevGuard --> GLI
+ DevGuard --> JIRA
+
+```
+
+## Finding Vulnerabilities
+
+You can integrate DevGuard with your code repository and CI/CD pipeline so that every time you push code or create a pull request, DevGuard automatically scans your code for vulnerabilities and reports the results.
+
+### Authentication Method
+ Scan results are sent to DevGuard using a **Personal Access Token (PAT)** also called DevGuard Token. This token authenticates the scanner and to your asset in DevGuard.
+
+
+
+## Managing Vulnerabilities
+
+Once DevGuard has identified vulnerabilities in your code, you can manage them in your preferred issue tracking platform. This could be:
+
+- **Same Platform**: GitHub Issues or GitLab Issues where your code is hosted
+- **Different Platform**: A separate project on GitHub/GitLab or a specialized system like Jira
+
+
+ The issue tracking platform doesn't need to be the same as your code hosting platform. For example, you can host your code on GitHub but track vulnerabilities in Jira.
+
+
+### Authentication Methods
+
+Each platform uses a different authentication method for issue management:
+
+| Platform | Authentication Method | Description |
+|----------|----------------------|-------------|
+| [**GitHub**](./github-integration) | GitHub App | Install the DevGuard GitHub App in your organization |
+| [**GitLab**](./gitlab-integration) | [OAuth2](./external-entity-providers) or Access Token | Use OAuth2 for gitlab.com/self-hosted instances, or configure an Access Token |
+| [**Jira**](./jira-integration) | API Token | Configure an API token with your Jira user email |
+
+### Bidirectional Synchronization
+
+DevGuard maintains bidirectional synchronization with integrated platforms:
+
+1. **DevGuard → External System**:
+ - Creating tickets when vulnerabilities are discovered
+ - Updating ticket status when vulnerabilities are resolved
+ - Adding comments with remediation information
+
+2. **External System → DevGuard**:
+ - Closing tickets marks vulnerabilities as accepted
+ - Reopening tickets reopens the vulnerability
+ - Comments with special commands (e.g., `/accept`, `/false-positive`) update vulnerability status
+
+## Webhook System
+
+DevGuard uses webhooks to receive real-time updates from integrated platforms. The webhook handler:
+
+1. Validates the incoming webhook payload
+2. Routes the webhook to the appropriate integration
+3. Processes events (issue updates, comments, etc.)
+4. Updates vulnerability states accordingly
+
+
+ Webhook secrets should be configured to ensure only authenticated requests are processed.
+
+
+
diff --git a/src/pages/explanations/integrations/jira-integration.mdx b/src/pages/explanations/integrations/jira-integration.mdx
index 2b117a2..3e54d7d 100644
--- a/src/pages/explanations/integrations/jira-integration.mdx
+++ b/src/pages/explanations/integrations/jira-integration.mdx
@@ -1,8 +1,104 @@
import Image from 'next/image';
-import { Callout } from 'nextra/components';
+import { Callout, Steps } from 'nextra/components';
import { Tooltip, TooltipTrigger, TooltipContent } from "@/components/ui/tooltip";
-import PageContentComingSoon from '@/components/PageContentComingSoon'
# Jira Integration
-
\ No newline at end of file
+DevGuard integrates with Jira to provide vulnerability ticket management in your existing issue tracking workflow.
+
+## Overview
+
+The Jira integration provides:
+
+- **Issue Creation**: Create Jira issues for discovered vulnerabilities — this can happen automatically for dependency vulnerabilities when they exceed a threshold, or manually by users for any vulnerability type
+- **Issue Updates**: Sync vulnerability status changes to Jira
+- **Webhook Processing**: React to issue transitions and comments in real-time
+- **Bidirectional Sync**: Comments in Jira can update vulnerability status in DevGuard
+
+## Integration Setup
+
+The Jira integration requires an API token and user email for authentication:
+
+| Field | Description |
+|-------|-------------|
+| `URL` | Your Jira instance URL (e.g., `https://company.atlassian.net`) |
+| `Token` | Jira API token for authentication |
+| `UserEmail` | Email address of the Jira user for the API token |
+| `Name` | A friendly name for this integration |
+
+
+ Create an API token in your Atlassian account settings under **Security → API tokens**.
+
+
+## How It Works
+
+1. **Configure Integration**: Add your Jira instance URL, API token, and user email in DevGuard
+2. **Link Asset**: Connect a DevGuard asset to a Jira project
+3. **Create Issues**: Vulnerabilities can be pushed to Jira as issues (automatically or manually)
+4. **Sync Status**: Changes in either system are synchronized via webhooks
+
+## Issue Creation
+
+When a vulnerability is flagged for remediation, DevGuard creates a Jira issue containing detailed information about the vulnerability, including severity, affected components, and labels for categorization.
+
+## Comment Commands
+
+Users can control vulnerability status through Jira comments:
+
+| Command | Effect |
+|---------|--------|
+| `/accept ` | Accept the vulnerability risk |
+| `/false-positive ` | Mark as false positive |
+| `/reopen` | Reopen a closed vulnerability |
+
+## Webhook Processing
+
+DevGuard processes Jira webhooks to synchronize issue state changes.
+
+
+ Configure the webhook secret in your Jira settings to ensure only authenticated requests are processed. DevGuard only accepts webhooks with a valid secret.
+
+
+### Processed Events
+
+| Event | Action |
+|-------|--------|
+| Issue Closed | Vulnerability marked as accepted |
+| Issue Reopened | Vulnerability reopened |
+| Comment Added | Process slash commands |
+
+## Issue State Synchronization
+
+DevGuard manages Jira issue states through transitions:
+
+| Jira Status Category | DevGuard Interpretation |
+|---------------------|--------------------------|
+| To Do | Open vulnerability |
+| In Progress | Open vulnerability |
+| Done | Closed vulnerability |
+
+## Priority Mapping
+
+DevGuard automatically sets the Jira issue priority based on vulnerability severity:
+
+| Severity | Jira Priority |
+|----------|---------------|
+| Critical | Highest |
+| High | Highest |
+| Medium | Default |
+| Low | Default |
+
+## Testing the Integration
+
+When saving a Jira integration, DevGuard validates:
+
+1. **API Token**: Tests authentication with Jira API
+2. **User Email**: Retrieves the Account ID for the provided email
+3. **Connection**: Verifies connectivity to the Jira instance
+
+## Related Documentation
+
+- [Connect Jira](/how-to-guides/integrations/jira/connect-jira) — Step-by-step setup guide
+- [Jira Issue Creation](/how-to-guides/integrations/jira/issue-creation) — Configure issue templates
+- [Jira Status Sync](/how-to-guides/integrations/jira/sync-status) — Understand status synchronization
+- [Integration Architecture](/explanations/integrations/integration-architecture) — Overall integration design
\ No newline at end of file