Skip to content

Commit f95deac

Browse files
authored
Merge pull request #18411 from github/repo-sync
repo sync
2 parents c97b40d + 66e660f commit f95deac

File tree

5 files changed

+10
-5
lines changed

5 files changed

+10
-5
lines changed

content/code-security/supply-chain-security/end-to-end-supply-chain/end-to-end-supply-chain-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ versions:
77
fpt: '*'
88
ghec: '*'
99
ghes: '*'
10+
ghae: '*'
1011
type: overview
1112
topics:
1213
- Organizations

content/code-security/supply-chain-security/end-to-end-supply-chain/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ versions:
55
fpt: '*'
66
ghec: '*'
77
ghes: '*'
8+
ghae: '*'
89
topics:
910
- Security overview
1011
- Organizations

content/code-security/supply-chain-security/end-to-end-supply-chain/securing-accounts.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ versions:
77
fpt: '*'
88
ghec: '*'
99
ghes: '*'
10+
ghae: '*'
1011
type: overview
1112
topics:
1213
- Organizations
@@ -117,9 +118,9 @@ If you're an organization owner, you can see which users don't have 2FA enabled,
117118

118119
## Connect to {% data variables.product.product_name %} using SSH keys
119120

120-
There are other ways to interact with {% data variables.product.product_name %} beyond signing into the website. Many people authorize the code they push to {% data variables.product.prodname_dotcom %} with an SSH private key. For more information, see "[About SSH](/authentication/connecting-to-github-with-ssh/about-ssh)."
121+
There are other ways to interact with {% data variables.product.product_name %} beyond signing into the website{% ifversion ghae %} via your IdP{% endif %}. Many people authorize the code they push to {% data variables.product.prodname_dotcom %} with an SSH private key. For more information, see "[About SSH](/authentication/connecting-to-github-with-ssh/about-ssh)."
121122

122-
Just like your account password, if an attacker were able to get your SSH private key, they could impersonate you and push malicious code to any repository you have write access for. If you store your SSH private key on a disk drive, it's a good idea to protect it with a passphrase. For more information, see "[Working with SSH key passphrases](/authentication/connecting-to-github-with-ssh/working-with-ssh-key-passphrases)."
123+
Just like {% ifversion ghae %}the password for your IdP account{% else %}your account password{% endif %}, if an attacker were able to get your SSH private key, they could impersonate you and push malicious code to any repository you have write access for. If you store your SSH private key on a disk drive, it's a good idea to protect it with a passphrase. For more information, see "[Working with SSH key passphrases](/authentication/connecting-to-github-with-ssh/working-with-ssh-key-passphrases)."
123124

124125
Another option is to generate SSH keys on a hardware security key. You could use the same key you're using for 2FA. Hardware security keys are very difficult to compromise remotely, because the private SSH key remains on the hardware, and is not directly accessible from software. For more information, see "[Generating a new SSH key for a hardware security key](/authentication/connecting-to-github-with-ssh/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent#generating-a-new-ssh-key-for-a-hardware-security-key)."
125126

content/code-security/supply-chain-security/end-to-end-supply-chain/securing-builds.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ versions:
77
fpt: '*'
88
ghec: '*'
99
ghes: '*'
10+
ghae: '*'
1011
type: overview
1112
topics:
1213
- Fundamentals

content/code-security/supply-chain-security/end-to-end-supply-chain/securing-code.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ versions:
77
fpt: '*'
88
ghec: '*'
99
ghes: '*'
10+
ghae: '*'
1011
type: overview
1112
topics:
1213
- Dependabot
@@ -80,16 +81,16 @@ If your organization uses {% data variables.product.prodname_GH_advanced_securit
8081
You can configure {% data variables.product.prodname_secret_scanning %} to check for secrets issued by many service providers and to notify you when any are detected. You can also define custom patterns to detect additional secrets at the repository, organization, or enterprise level. For more information, see "[About secret scanning](/code-security/secret-scanning/about-secret-scanning)" and "[Secret scanning patterns](/code-security/secret-scanning/secret-scanning-patterns)."
8182
{% endif %}
8283

83-
{% ifversion fpt or ghec or ghes > 3.2 %}
84+
{% ifversion fpt or ghec or ghes > 3.2 or ghae %}
8485
### Secure storage of secrets you use in {% data variables.product.product_name %}
8586
{% endif %}
8687

8788
{% ifversion fpt or ghec %}
8889
Besides your code, you probably need to use secrets in other places. For example, to allow {% data variables.product.prodname_actions %} workflows, {% data variables.product.prodname_dependabot %}, or your {% data variables.product.prodname_codespaces %} development environment to communicate with other systems. For more information on how to securely store and use secrets, see "[Encrypted secrets in Actions](/actions/security-guides/encrypted-secrets)," "[Managing encrypted secrets for Dependabot](/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/managing-encrypted-secrets-for-dependabot)," and "[Managing encrypted secrets for your codespaces](/codespaces/managing-your-codespaces/managing-encrypted-secrets-for-your-codespaces)."
8990
{% endif %}
9091

91-
{% ifversion ghes > 3.2 %}
92-
Besides your code, you probably need to use secrets in other places. For example, to allow {% data variables.product.prodname_actions %} workflows or {% data variables.product.prodname_dependabot %} to communicate with other systems. For more information on how to securely store and use secrets, see "[Encrypted secrets in Actions](/actions/security-guides/encrypted-secrets)", and "[Managing encrypted secrets for Dependabot](/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/managing-encrypted-secrets-for-dependabot)."
92+
{% ifversion ghes > 3.2 or ghae %}
93+
Besides your code, you probably need to use secrets in other places. For example, to allow {% data variables.product.prodname_actions %} workflows{% ifversion ghes %} or {% data variables.product.prodname_dependabot %}{% endif %} to communicate with other systems. For more information on how to securely store and use secrets, see "[Encrypted secrets in Actions](/actions/security-guides/encrypted-secrets){% ifversion ghes %}" and "[Managing encrypted secrets for Dependabot](/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/managing-encrypted-secrets-for-dependabot)."{% else %}."{% endif %}
9394
{% endif %}
9495

9596
## Keep vulnerable coding patterns out of your repository

0 commit comments

Comments
 (0)