Skip to main content
Ona integrations fall into three categories:
  • Source control for cloning repositories, pushing commits, and letting agents interact with pull requests and issues
  • Tool integrations for giving agents access to work trackers, docs, incident tools, and other MCP-backed services
  • Cloud access for federating from environments into providers like AWS without long-lived credentials
This page is the overview. Use the linked setup guides for provider-specific steps.

Source control

Source control is the foundational integration in Ona. It gives environments access to your repositories and lets agents work with the same permissions your developers already have. Supported providers:
ProviderRepo accessAgent API tools
GitHubYesYes
GitLabYesYes
Bitbucket CloudYesNo
Azure DevOpsYesNo

Tool integrations for agents

Most non-SCM integrations are exposed to agents through the Model Context Protocol (MCP). They require:
  1. Organization-level enablement by an administrator
  2. User authentication so the agent acts with your permissions
Organization integration configuration interface
User authentication interface for integrations
Available integrations:
IntegrationWhat agents can doSetup
LinearRead issues, update status, use backlog contextConfigure Linear
AtlassianWork with Jira and ConfluenceConfigure Atlassian
NotionSearch and read workspace docsConfigure Notion
SentryInspect errors and issue contextConfigure Sentry
GranolaSearch meeting notes and transcriptsConfigure Granola
To check status during a session, open the MCP Integrations panel in the prompt input.
MCP Integrations panel showing available integrations with status indicators

Cloud access

Ona environments can also federate into cloud providers using short-lived credentials instead of static secrets. GCP follows the same OIDC pattern described in the OIDC guide. Some things that used to get lumped in as “integrations” are better understood as developer interfaces or launch methods: