Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Setting Up the UniFi Integration in Hudu

Hudu
04/22/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • The UniFi integration requires a local or self-hosted UniFi controller and authenticates using main UniFi credentials entered in Hudu's integration settings.
  • After initial connection, users match UniFi sites to Hudu companies, with the system suggesting matches or allowing creation of new companies for unmatched sites.
  • Extensive filtering options allow exclusion of inactive companies and specific device types, with customizable sort rules to assign devices to appropriate Hudu asset layouts.

Summary

This tutorial demonstrates the complete setup process for integrating Ubiquiti UniFi with Hudu's IT documentation platform. The integration requires a local or self-hosted UniFi controller and uses the main UniFi credentials for authentication. The walkthrough covers the initial connection setup, company matching workflow, device filtering options, and asset layout assignments. Key configuration steps include entering the UniFi domain and credentials, selecting which device types and inactive companies to exclude from sync, matching UniFi sites to existing Hudu companies, and defining sort rules for how different device categories map to Hudu's asset layouts. The integration automatically imports network details and can map them to Hudu's network section, providing comprehensive visibility into UniFi-managed infrastructure within the documentation platform. Multiple sync cycles are demonstrated to show how filtering changes affect imported data.

Chapters

0:00 - Integration Requirements
0:13 - Initial Connection Setup
1:21 - Company Matching Process
1:53 - Device Filtering and Sort Rules

Key Quotes

0:04 "... if you are going to be deploying this integration, it does have to be from the local or self hosted version of unify ..."
1:29 "... if who do has a match will suggest a place to go. If not, we will also be able to create a new company to match what we found in your integration ..."
3:43 "... we are able to bring in those network details and also assign it to your network section. So if you already have those items defined in Unify, Hoodoo will be able to bring those over and map them within your instance ..."

Categories:
  • » Cybersecurity » Network Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Network Security
  • How-To
  • Getting Started
  • Technical Deep Dive
  • IT documentation
  • network management integration
  • UniFi controller
  • asset management
  • MSP tools
  • device synchronization
  • company matching
  • network mapping
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Setting Up the UniFi Integration in Hudu

              Upcoming Webinar Calendar

              • 04/23/2026
                01:00 PM
                04/23/2026
                Cultivating Trust as a Foundation for the Agentic Consumer in 2026
                https://www.truthinit.com/index.php/channel/1883/cultivating-trust-as-a-foundation-for-the-agentic-consumer-in-2026/
              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/

              Upcoming Events

              • Apr
                23

                Cultivating Trust as a Foundation for the Agentic Consumer in 2026

                04/23/202601:00 PM ET
                • Apr
                  29

                  Strategies for Safeguarding AI in Applications, Agents, and APIs

                  04/29/202612:00 PM ET
                  • Apr
                    30

                    Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                    04/30/202610:00 AM ET
                    • Apr
                      30

                      The New Economics of a VMware Exit

                      04/30/202601:00 PM ET
                      • May
                        06

                        Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                        05/06/202602:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version