You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/actions/concepts/security/openid-connect.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -166,6 +166,8 @@ You can use the `repo_property_*` claims in your cloud provider's trust conditio
166
166
167
167
{% endif %}
168
168
169
+
{% ifversion dependabot-oidc-support %}
170
+
169
171
## OIDC support for {% data variables.product.prodname_dependabot %}
170
172
171
173
{% data variables.product.prodname_dependabot %} can use OIDC to authenticate with private registries, eliminating the need to store long-lived credentials as repository secrets. With OIDC-based authentication, {% data variables.product.prodname_dependabot %} update jobs can dynamically obtain short-lived credentials from your cloud identity provider.
@@ -180,6 +182,8 @@ The benefits of OIDC authentication for {% data variables.product.prodname_depen
180
182
181
183
For more information, see [AUTOTITLE](/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot#using-oidc-for-authentication).
182
184
185
+
{% endif %}
186
+
183
187
## Next steps
184
188
185
189
For more information about configuring OIDC, see [AUTOTITLE](/actions/how-tos/security-for-github-actions/security-hardening-your-deployments).
Copy file name to clipboardExpand all lines: content/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,6 +76,8 @@ Before you require secure methods of two-factor authentication, we recommend not
76
76
77
77
You can use a SSH certificate authority (CA) to allow members of any organization owned by your enterprise to access that organization's repositories using SSH certificates you provide. {% ifversion ssh-user-ca %}{% ifversion ghec %}If your enterprise uses {% data variables.product.prodname_emus %}, enterprise{% elsif ghes %}Enterprise{% endif %} members can also be allowed to use the certificate to access personally-owned repositories.{% endif %} {% data reusables.organizations.can-require-ssh-cert %} For more information, see [AUTOTITLE](/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities).
78
78
79
+
{% data variables.product.github %} uses OpenSSH-format SSH user certificates to authenticate Git operations over SSH by validating the certificate's signature and fields (including its validity period) against a trusted SSH certificate authority (CA) configured at the organization and/or enterprise level.
80
+
79
81
{% data reusables.organizations.add-extension-to-cert %}
80
82
81
83
### Adding an SSH certificate authority
@@ -104,7 +106,9 @@ You can enable or disable access to user-owned repositories with an SSH certific
104
106
105
107
### Deleting an SSH certificate authority
106
108
107
-
Deleting a CA cannot be undone. If you want to use the same CA in the future, you'll need to upload the CA again.
109
+
Deleting an SSH certificate authority (CA) from your enterprise settings on {% data variables.product.github %} can't be undone. If you want to trust the same CA again in the future, you'll need to add the CA back to {% data variables.product.github %} by uploading the CA's public key again in your enterprise's SSH certificate authority settings.
110
+
111
+
Deleting a CA immediately prevents {% data variables.product.github %} from accepting SSH certificates signed by that CA, including certificates that have not yet expired. For CA rotation guidance, see [AUTOTITLE](/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities#certificate-revocation-and-ca-rotation).
108
112
109
113
{% data reusables.enterprise-accounts.access-enterprise %}
110
114
{% data reusables.enterprise-accounts.settings-tab %}
Copy file name to clipboardExpand all lines: content/admin/managing-github-actions-for-your-enterprise/enabling-github-actions-for-github-enterprise-server/enabling-github-actions-with-google-cloud-storage.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,6 +27,9 @@ Before enabling {% data variables.product.prodname_actions %}, make sure you hav
27
27
{% data reusables.actions.enterprise-common-prereqs %}
28
28
{% data reusables.actions.enterprise-oidc-prereqs %}
29
29
30
+
> [!WARNING]
31
+
> The GCS bucket used for {% data variables.product.prodname_actions %} blob storage must use Google-managed encryption keys. Customer-Managed Encryption Keys (CMEK) are not currently supported and will cause {% data variables.product.prodname_actions %} database migrations to fail with a hash mismatch error. This restriction applies only to the {% data variables.product.prodname_actions %} blob storage bucket; CMEK may still be used on VM disks and other GCP resources.
32
+
30
33
## Enabling {% data variables.product.prodname_actions %} with Google Cloud Storage using OIDC (recommended)
31
34
32
35
To configure {% data variables.product.prodname_ghe_server %} to use OIDC with Google Cloud Storage, you must first create a Google Cloud service account, then create a Google Cloud identity pool and identity provider, and finally configure {% data variables.product.prodname_ghe_server %} to use the provider and service account to access your Google Cloud Storage bucket.
Copy file name to clipboardExpand all lines: content/code-security/concepts/secret-security/about-alerts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ contentType: concepts
20
20
21
21
## About {% ifversion fpt or ghec %}user alerts {% else %}{% data variables.secret-scanning.alerts %}{% endif %}
22
22
23
-
{% data reusables.secret-scanning.secret-scanning-about-alerts %} {% data reusables.secret-scanning.repository-alert-location %}
23
+
{% data reusables.secret-scanning.secret-scanning-about-alerts %} {% data reusables.secret-scanning.repository-alert-location %} If the same secret appears multiple times within a single file, only one alert is created.
24
24
25
25
To help you triage alerts more effectively, {% data variables.product.company_short %} separates alerts into two lists:
Copy file name to clipboardExpand all lines: content/code-security/concepts/supply-chain-security/about-dependabot-alerts.md
+18-2Lines changed: 18 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,9 +54,25 @@ See [AUTOTITLE](/code-security/dependabot/dependabot-alerts/configuring-dependab
54
54
55
55
## Alert ownership and assignments
56
56
57
-
Users with write access or higher can assign {% data variables.product.prodname_dependabot_alerts %} to repository collaborators, teams, or {% data variables.product.prodname_copilot_short %} to establish clear ownership for vulnerability remediation. Assignments help track who's responsible for each alert and prevent vulnerabilities from being overlooked.
57
+
Users with write access or higher can assign {% data variables.product.prodname_dependabot_alerts %} to repository collaborators, teams, or AI agents to establish clear ownership for vulnerability remediation. Assignments help track who's responsible for each alert and prevent vulnerabilities from being overlooked.
58
58
59
-
When an alert is assigned, the assignee receives a notification and the alert displays their name in the alert list. You can filter alerts by assignee to track progress. Assigning an alert to {% data variables.product.prodname_copilot_short %} automatically generates a fix and opens a draft pull request for review.
59
+
You can assign alerts to the following types of agents:
60
+
61
+
***{% data variables.product.prodname_copilot_short %}**, {% data variables.product.github %}'s built-in AI agent.
62
+
***Third-party agents**,such as Codex or Claude, when enabled in your repository settings.
63
+
64
+
When an alert is assigned to a person or team, the assignee receives a notification and the alert displays their name in the alert list. You can filter alerts by assignee to track progress.
65
+
66
+
When an alert is assigned to an agent, the agent automatically creates a session and opens a draft pull request with a proposed fix. If the agent can't generate a fix, it remains as an assignee, and you can click **View Session** on the alert timeline to review the agent's log.
67
+
68
+
> [!NOTE]
69
+
> Assignment visibility is currently scoped to the repository-level alerts view. The organization-wide security overview does not display alert assignments.
70
+
71
+
When an alert's assignees change, {% data variables.product.github %} sends an `assignees_changed` webhook event. You can use this event to trigger workflows or sync assignment data with external systems. For more information, see [AUTOTITLE](/webhooks/webhook-events-and-payloads#dependabot_alert).
72
+
73
+
### Automation and integrations
74
+
75
+
You can manage alert assignments programmatically using the REST API. For more information, see [AUTOTITLE](/rest/dependabot/alerts).
60
76
61
77
For information about assigning alerts, see [AUTOTITLE](/code-security/how-tos/manage-security-alerts/manage-dependabot-alerts/viewing-and-updating-dependabot-alerts#viewing-and-prioritizing-dependabot-alerts).
Copy file name to clipboardExpand all lines: content/code-security/how-tos/manage-security-alerts/manage-dependabot-alerts/viewing-and-updating-dependabot-alerts.md
+14-1Lines changed: 14 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,12 @@ By default, alerts are sorted by **Most important**, which helps you prioritize
38
38
39
39
{% data reusables.dependabot.where-to-view-dependabot-alerts %}
40
40
41
+
{% ifversion dependabot-alerts-assignees %}
42
+
43
+
When you assign an alert to an AI agent, the agent automatically creates a session and opens a draft pull request with a proposed fix. If the agent can't generate a fix, it remains as an assignee of the alert. You can click **View Session** on the alert timeline to review the agent's log and understand why no pull request was created. Only a user can remove the agent as an assignee.
44
+
45
+
{% endif %}
46
+
41
47
{% data reusables.repositories.navigate-to-repo %}
42
48
{% data reusables.repositories.sidebar-security %}
43
49
{% data reusables.repositories.sidebar-dependabot-alerts %}
@@ -58,7 +64,14 @@ By default, alerts are sorted by **Most important**, which helps you prioritize
58
64

59
65
60
66
{% ifversion dependabot-alerts-assignees %}
61
-
1. On the right panel, select an assignee by using the **Assignees** dropdown list. You can assign the alert to a user or team to establish clear ownership, or assign it to {% data variables.product.prodname_copilot_short %} to automatically generate a fix. This clearly communicates who is responsible for triaging the alert and helps you avoid repetitive analysis. It also ensures that alerts are not missed.
67
+
1. On the right panel, assign ownership for the alert:
68
+
* Click the {% octicon "gear" aria-label="Show options" %} dropdown menu next to "Assignees" to select a user, team, or AI agent from the list. You can also click **Assign to Agent** to assign directly to an agent.
69
+
70
+
When you assign an alert to an agent, a dialog appears where you can optionally:
71
+
* Add a custom prompt with additional context about the fix.
72
+
* Select a different repository.
73
+
* Select the AI model to use.
74
+
* Select a custom agent you have configured (recommended for specialized tasks).
62
75
{% endif %}
63
76
64
77
1. Optionally, to suggest an improvement to the related security advisory, on the right-hand side of the alert details page, click **Suggest improvements for this advisory on the {% data variables.product.prodname_advisory_database %}**. See [AUTOTITLE](/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/editing-security-advisories-in-the-github-advisory-database).
Copy file name to clipboardExpand all lines: content/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot.md
+16Lines changed: 16 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,6 +124,8 @@ If your private registry is configured with an IP allow list, you can find the I
124
124
125
125
{% endif %}
126
126
127
+
{% ifversion dependabot-oidc-support %}
128
+
127
129
## Using OIDC for authentication
128
130
129
131
{% data variables.product.prodname_dependabot %} can use OpenID Connect (OIDC) to authenticate with private registries, eliminating the need to store long-lived credentials as repository secrets.
@@ -191,6 +193,8 @@ registries:
191
193
192
194
For more information about how OIDC works, see [AUTOTITLE](/actions/concepts/security/openid-connect).
193
195
196
+
{% endif %}
197
+
194
198
## Allowing external code execution
195
199
196
200
When you give {% data variables.product.prodname_dependabot %} access to one or more registries, external code execution is automatically disabled to protect your code from compromised packages. However, some version updates may fail.
@@ -430,6 +434,8 @@ registries:
430
434
431
435
{% endraw %}
432
436
437
+
{% ifversion dependabot-oidc-support %}
438
+
433
439
You can also use OIDC authentication to access JFrog Artifactory. {% data reusables.dependabot.dependabot-oidc-credentials %}
434
440
435
441
{% raw %}
@@ -446,6 +452,8 @@ registries:
446
452
447
453
{% endraw %}
448
454
455
+
{% endif %}
456
+
449
457
### `npm-registry`
450
458
451
459
The `npm-registry` type supports username and password, or token. {% data reusables.dependabot.password-definition %}
@@ -516,6 +524,8 @@ registries:
516
524
517
525
{% endraw %}
518
526
527
+
{% ifversion dependabot-oidc-support %}
528
+
519
529
You can also use OIDC authentication to access Azure DevOps Artifacts. {% data reusables.dependabot.dependabot-oidc-credentials %}
520
530
521
531
{% raw %}
@@ -533,6 +543,8 @@ registries:
533
543
534
544
The `AZURE_TENANT_ID` and `AZURE_CLIENT_ID` values can be obtained from the overview page of your Entra ID app registration.
535
545
546
+
{% endif %}
547
+
536
548
### `pub-repository`
537
549
538
550
The `pub-repository` type supports a URL and a token.
@@ -590,6 +602,8 @@ registries:
590
602
591
603
{% endraw %}
592
604
605
+
{% ifversion dependabot-oidc-support %}
606
+
593
607
You can also use OIDC authentication to access Azure DevOps Artifacts. {% data reusables.dependabot.dependabot-oidc-credentials %}
594
608
595
609
{% raw %}
@@ -606,6 +620,8 @@ registries:
606
620
607
621
{% endraw %}
608
622
623
+
{% endif %}
624
+
609
625
### `rubygems-server`
610
626
611
627
The `rubygems-server` type supports username and password, or token. {% data reusables.dependabot.password-definition %}
| `composer-repository` | `username` and `password` |
1007
+
| `docker-registry` | `username` and `password` |
1008
+
| `git` | `username` and `password` |
1009
+
| `hex-organization` | `organization` and `key` |
1010
+
| `hex-repository` | `repo` and `auth-key` optionally with the corresponding `public-key-fingerprint` |
1011
+
| `maven-repository` | `username` and `password` |
1012
+
| `npm-registry` | `username` and `password`<br>or `token` |
1013
+
| `nuget-feed` | `username` and `password`<br>or `token` |
1014
+
| `pub-registry` | `token` |
1015
+
| `python-index` | `username` and `password`<br>or `token` |
1016
+
| `rubygems-server` | `username` and `password`<br>or `token` |
1017
+
| `terraform-registry` | `token` |
1018
+
1019
+
{% endif %}
1020
+
999
1021
All sensitive data used for authentication should be stored securely and referenced from that secure location, see [AUTOTITLE](/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot).
1000
1022
1001
1023
> [!TIP]
1002
1024
> {% data reusables.dependabot.password-definition %}
1003
1025
1026
+
{% ifversion dependabot-oidc-support %}
1027
+
1004
1028
For more information about OIDC support for {% data variables.product.prodname_dependabot %}, see [AUTOTITLE](/actions/concepts/security/openid-connect#oidc-support-for-dependabot) and [AUTOTITLE](/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot#using-oidc-for-authentication).
1005
1029
1030
+
{% endif %}
1031
+
1006
1032
### `url` and `replaces-base`
1007
1033
1008
1034
The `url` parameter defines where to access a registry. When the optional `replaces-base` parameter is enabled (`true`), {% data variables.product.prodname_dependabot %} resolves dependencies using the value of `url` rather than the base URL of that specific ecosystem.
Copy file name to clipboardExpand all lines: content/copilot/concepts/agents/cloud-agent/about-cloud-agent.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ With {% data variables.copilot.copilot_cloud_agent %}, {% data variables.product
40
40
When you delegate tasks to {% data variables.copilot.copilot_cloud_agent %}, you can:
41
41
42
42
* Use the agents panel or other agents entry points on {% data variables.product.prodname_dotcom_the_website %} to have {% data variables.product.prodname_copilot_short %} research, plan, and make code changes on a branch, then iterate before creating a pull request. You can also specify in your prompt that you want a pull request created right away. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/research-plan-iterate).
43
-
* Ask {% data variables.product.prodname_copilot_short %} to open a new pull request from other entry points, including {% data variables.product.prodname_github_issues %} and {% data variables.product.prodname_vscode %}. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/create-a-pr).
43
+
* Ask {% data variables.product.prodname_copilot_short %} to open a new pull request from other entry points, including {% data variables.product.prodname_github_issues %} and {% data variables.product.prodname_vscode %}. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/start-copilot-sessions).
44
44
* Mention `@copilot` in a comment on an existing pull request to ask it to make changes. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/make-changes-to-an-existing-pr).
45
45
{% ifversion security-campaigns-assign-to-cca %}* Assign security alerts to {% data variables.product.prodname_copilot_short %} from security campaigns. See [AUTOTITLE](/code-security/code-scanning/managing-code-scanning-alerts/fixing-alerts-in-security-campaign#assigning-alerts-to-copilot-cloud-agent).{% endif %}
Copy file name to clipboardExpand all lines: content/copilot/concepts/agents/cloud-agent/agent-management.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ To learn more about {% data variables.copilot.copilot_cloud_agent %}, see [AUTOT
34
34
35
35
From the Agents tab, you can:
36
36
37
-
***Kick off new agent tasks**: Select an AI model of your choice, and optionally choose from third-party agents or {% data variables.copilot.custom_agents_short %} best suited for the task. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/create-a-pr).
37
+
***Kick off new agent tasks**: Select an AI model of your choice, and optionally choose from third-party agents or {% data variables.copilot.custom_agents_short %} best suited for the task. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/start-copilot-sessions).
38
38
***Monitor live session logs**: Once the agent starts working, you can click any agent session to open the session log and follow its progress and thought process in real time.
39
39
***Track active sessions**: You can view all active agent sessions that have been started in the repository.
40
40
***Steer agents mid-session**: If you realize you didn't scope a request correctly, or want the agent to use a specific tool or service, you can step in and provide **steering input** without stopping the run. Steering uses **one premium request** per message. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/track-copilot-sessions#steering-a-copilot-session-from-the-agents-tab).
0 commit comments