Skip to content

Commit 8a2d547

Browse files
Merge branch 'main' into use-checkout-reusable
2 parents 195dff8 + b843199 commit 8a2d547

File tree

67 files changed

+902
-8432
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+902
-8432
lines changed

content/admin/data-residency/network-details-for-ghecom.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -200,6 +200,8 @@ Japan region:
200200
#### EU
201201

202202
`*.blob.core.windows.net` can be replaced with:
203+
* `memoryalphaprodsdc01.blob.core.windows.net`
204+
* `memoryalphaprodweu01.blob.core.windows.net`
203205
* `prodsdc01resultssa0.blob.core.windows.net`
204206
* `prodsdc01resultssa1.blob.core.windows.net`
205207
* `prodsdc01resultssa2.blob.core.windows.net`
@@ -212,6 +214,7 @@ Japan region:
212214
#### Australia
213215

214216
`*.blob.core.windows.net` can be replaced with:
217+
* `memoryalphaprodae01.blob.core.windows.net`
215218
* `prodae01resultssa0.blob.core.windows.net`
216219
* `prodae01resultssa1.blob.core.windows.net`
217220
* `prodae01resultssa2.blob.core.windows.net`
@@ -220,6 +223,7 @@ Japan region:
220223
#### Japan
221224

222225
`*.blob.core.windows.net` can be replaced with:
226+
* `memoryalphaprodjpw01.blob.core.windows.net`
223227
* `prodjpw01resultssa0.blob.core.windows.net`
224228
* `prodjpw01resultssa1.blob.core.windows.net`
225229
* `prodjpw01resultssa2.blob.core.windows.net`

content/admin/overview/setting-up-a-trial-of-github-enterprise-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ If you invite an existing organization into your trial enterprise, **all of thes
5454

5555
## Do I need to provide a payment method?
5656

57-
You do not need to provide a payment method to start a trial. If you want to use {% data variables.copilot.copilot_business_short %} during the trial, you can contact {% data variables.contact.github_support %} for approval. Once your request is approved, you will need to provide a credit card for additional validation. You **won't** be charged for using {% data variables.copilot.copilot_business_short %} during the trial.
57+
You do not need to provide a payment method to start a trial.
5858

5959
## During the trial
6060

content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-usage-and-access/giving-org-access-private-registries.md

Lines changed: 28 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,13 +43,17 @@ You need to be an **organization owner** to set up access to private registries
4343
1. Use the **URL** and **Type** fields to define the location and type of the registry:
4444
* **URL** is the location where you access the private registry. For example, to use the {% data variables.product.prodname_registry %} registry for NuGet: `https://nuget.pkg.github.com/ORGANIZATION/index.json`, where `ORGANIZATION` is the name of your organization on {% data variables.product.github %}.
4545
* **Type** is the type of registry.
46-
1. Select either **Token** or **Username and password**, depending on the authentication method, then enter data into the appropriate fields.
47-
Some types of authentication tokens, such as a {% data variables.product.github %} {% data variables.product.pat_generic_title_case %}, are tied to a particular user identity. Select the **Username and password** option for these and enter the relevant username as **Username** and the token as **Password**.
46+
1. Select the authentication method for the registry:
47+
* **Token**: Enter the token used to authenticate with the registry.
48+
* **Username and password**: Enter the username and password used to authenticate with the registry. Some types of authentication tokens, such as a {% data variables.product.github %} {% data variables.product.pat_generic_title_case %}, are tied to a particular user identity. Select this option for these and enter the relevant username as **Username** and the token as **Password**.
49+
{% ifversion org-private-registry-oidc %}
50+
* **OIDC (OpenID Connect)**: Use short-lived credentials from a cloud identity provider instead of storing long-lived secrets. When you select this option, choose a provider and fill in the provider-specific fields. For more information, see [Configuring OIDC authentication for a private registry](#configuring-oidc-authentication-for-a-private-registry).
51+
{% endif %}
4852
1. Define which repositories in the organization can access the private registry using these details: all, private and internal, or selected repositories only.
4953
1. When you have finished defining the private registry, select **Add Registry** to save the registry information.
5054

5155
> [!TIP]
52-
> When you add a private registry to an organization the token or password is stored as an encrypted secret. Once the registry is created, the token or password cannot be viewed again.
56+
> When you add a private registry to an organization using **Token** or **Username and password** authentication, the token or password is stored as an encrypted secret. Once the registry is created, the token or password cannot be viewed again.
5357
5458
### Enabling {% data variables.product.prodname_code_scanning %} default setup to use a registry definition
5559

@@ -77,6 +81,27 @@ Any private registries used by the build must also be accessible to the workflow
7781

7882
When you configure access to one or more private registries, {% data variables.product.prodname_dependabot %} can propose pull requests to upgrade a vulnerable dependency or to maintain a dependency, see [AUTOTITLE](/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot) and [AUTOTITLE](/code-security/dependabot/working-with-dependabot/guidance-for-the-configuration-of-private-registries-for-dependabot).
7983

84+
{% ifversion org-private-registry-oidc %}
85+
86+
### Configuring OIDC authentication for a private registry
87+
88+
OIDC (OpenID Connect) authentication allows {% data variables.product.prodname_dependabot %} to use short-lived credentials from your cloud identity provider to access private registries, eliminating the need to store long-lived secrets. With OIDC, credentials are generated dynamically for each {% data variables.product.prodname_dependabot %} update job. You must configure a trust relationship between your cloud provider and {% data variables.product.github %} before {% data variables.product.prodname_dependabot %} can authenticate.
89+
90+
> [!NOTE]
91+
> OIDC authentication for organization-level private registries is currently supported by {% data variables.product.prodname_dependabot %}. It is not supported by {% data variables.product.prodname_code_scanning %} default setup.
92+
93+
When you select **OIDC** as the authentication method for a private registry, choose one of the supported providers and fill in the required fields:
94+
95+
* **Azure**: Enter the **Tenant ID** (Azure AD tenant ID) and **Client ID** (Azure AD application client ID). You must configure a federated credential in Azure AD that trusts {% data variables.product.github %}'s OIDC provider.
96+
* **AWS CodeArtifact**: Enter the **AWS Region**, **Account ID** (AWS account ID), **Role Name** (IAM role name), **Domain** (CodeArtifact domain), and **Domain Owner** (CodeArtifact domain owner / AWS account ID). You can optionally provide an **Audience**. You must configure an IAM OIDC identity provider in AWS that trusts {% data variables.product.github %}'s OIDC provider.
97+
* **JFrog Artifactory**: Enter the **OIDC Provider Name**. You can optionally provide an **Audience** and **Identity Mapping Name**.
98+
99+
The authentication type of a private registry cannot be changed after creation. To switch from OIDC to another authentication method, or vice versa, delete the existing registry and create a new one.
100+
101+
For more information about how OIDC works, see [AUTOTITLE](/actions/concepts/security/openid-connect).
102+
103+
{% endif %}
104+
80105
{% ifversion code-quality %}
81106

82107
## {% data variables.product.prodname_code_quality_short %} access to private registries

content/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,11 @@ For specific ecosystems, you can configure {% data variables.product.prodname_de
3232

3333
{% ifversion org-private-registry %}
3434

35-
You can configure {% data variables.product.prodname_dependabot %}'s access to private registries at the org-level. For more information on how to configure that, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/giving-org-access-private-registries).
35+
You can configure {% data variables.product.prodname_dependabot %}'s access to private registries at the org-level.
36+
{% ifversion org-private-registry-oidc %}
37+
Organization-level registries support **Token**, **Username and password**, and **OIDC** authentication.
38+
{% endif %}
39+
For more information about configuration, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/giving-org-access-private-registries).
3640

3741
{% endif %}
3842

@@ -126,6 +130,13 @@ If your private registry is configured with an IP allow list, you can find the I
126130

127131
With OIDC-based authentication, {% data variables.product.prodname_dependabot %} update jobs can dynamically obtain short-lived credentials from your cloud identity provider, just like {% data variables.product.prodname_actions %} workflows using OIDC federation.
128132

133+
{% ifversion org-private-registry-oidc %}
134+
135+
> [!TIP]
136+
> OIDC authentication is also available for **organization-level** private registries, which you can configure through the organization settings UI or the REST API. For more information, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/giving-org-access-private-registries#configuring-oidc-authentication-for-a-private-registry).
137+
138+
{% endif %}
139+
129140
{% data variables.product.prodname_dependabot %} supports OIDC authentication for any registry type that uses `username` and `password` authentication, when the registry is hosted on one of the following cloud providers:
130141

131142
* AWS CodeArtifact

content/copilot/concepts/agents/cloud-agent/access-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ redirect_from:
1919
- /copilot/concepts/agents/coding-agent/coding-agent-for-business-and-enterprise
2020
- /copilot/concepts/agents/coding-agent/managing-access
2121
contentType: concepts
22-
category:
22+
category:
2323
- Manage Copilot for a team
2424
---
2525

@@ -48,7 +48,7 @@ Enterprise administrators and organization owners (for organization-owned reposi
4848

4949
For information on disabling {% data variables.copilot.copilot_cloud_agent %} in some or all repositories owned by an organization, see [AUTOTITLE](/copilot/how-tos/administer-copilot/manage-for-organization/add-copilot-cloud-agent).
5050

51-
For information on disabling {% data variables.copilot.copilot_cloud_agent %} in all repositories owned by an enterprise, see [AUTOTITLE](/enterprise-cloud@latest/copilot/how-tos/administer-copilot/manage-for-enterprise/manage-agents/manage-copilot-cloud-agent).
51+
For information on disabling {% data variables.copilot.copilot_cloud_agent %} in all repositories owned by an enterprise, see [AUTOTITLE](/copilot/how-tos/administer-copilot/manage-for-enterprise/manage-agents/block-copilot-cloud-agent).
5252

5353
For information on disabling {% data variables.copilot.copilot_cloud_agent %} in repositories owned by your personal user account, see [AUTOTITLE](/copilot/managing-copilot/managing-copilot-as-an-individual-subscriber/managing-your-copilot-plan/managing-copilot-policies-as-an-individual-subscriber#enabling-or-disabling-copilot-cloud-agent).
5454

content/copilot/concepts/auto-model-selection.md

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -38,15 +38,7 @@ Experience less rate limiting and reduce the mental load of choosing a model by
3838
* Eclipse
3939
* Xcode
4040

41-
When you select **Auto** in {% data variables.copilot.copilot_chat_short %}, {% data variables.copilot.copilot_auto_model_selection_short_cap_a %} may choose from the following list of models, subject to your policies and subscription type. Models may change over time.
42-
* {% data variables.copilot.copilot_gpt_41 %}
43-
* {% data variables.copilot.copilot_gpt_53_codex %}
44-
* {% data variables.copilot.copilot_gpt_54 %}
45-
* {% data variables.copilot.copilot_gpt_54_mini %}
46-
* {% data variables.copilot.copilot_claude_haiku_45 %}
47-
* {% data variables.copilot.copilot_claude_sonnet_46 %}
48-
* {% data variables.copilot.copilot_grok_code %}
49-
* {% data variables.copilot.copilot_raptor_mini %}
41+
When you select **Auto** in {% data variables.copilot.copilot_chat_short %}, {% data variables.copilot.copilot_auto_model_selection_short_cap_a %} chooses from the supported models, subject to your policies and subscription type. Models may change over time. See [AUTOTITLE](/copilot/reference/ai-models/supported-models#supported-ai-models-in-auto-model-selection).
5042

5143
> [!TIP] To see which model was used for each response, hover over the response in {% data variables.copilot.copilot_chat_short %}.
5244
@@ -62,8 +54,7 @@ During the {% data variables.release-phases.public_preview %}, if you're using a
6254

6355
## {% data variables.copilot.copilot_auto_model_selection_short_cap_a %} in {% data variables.copilot.copilot_cloud_agent %}
6456

65-
When you select **Auto** in {% data variables.copilot.copilot_cloud_agent %}, {% data variables.copilot.copilot_auto_model_selection_short_cap_a %} currently chooses from the following list of models, subject to your policies and subscription type:
66-
{% data reusables.copilot.copilot-cloud-agent-auto-models %}
57+
When you select **Auto** in {% data variables.copilot.copilot_cloud_agent %}, {% data variables.copilot.copilot_auto_model_selection_short_cap_a %} chooses from the supported list of models, subject to your policies and subscription type. See [AUTOTITLE](/copilot/reference/ai-models/supported-models#supported-ai-models-in-auto-model-selection).
6758

6859
{% data reusables.copilot.change-the-ai-model-copilot-cloud-agent %}
6960

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: Blocking GitHub Copilot cloud agent in your enterprise
3+
intro: 'Disable use of {% data variables.copilot.copilot_cloud_agent %} for all users and repositories.'
4+
permissions: Enterprise owners and AI managers
5+
versions:
6+
feature: copilot
7+
shortTitle: 'Block {% data variables.copilot.copilot_cloud_agent %}'
8+
contentType: how-tos
9+
category:
10+
- Manage Copilot for a team
11+
allowTitleToDifferFromFilename: true
12+
---
13+
14+
Most {% data variables.product.prodname_copilot_short %} policies, including "Enable {% data variables.copilot.copilot_cloud_agent %}", only affect users who receive a {% data variables.product.prodname_copilot_short %} license from your enterprise or organizations.
15+
16+
If you want to disable {% data variables.copilot.copilot_cloud_agent %} in repositories completely, including for users who get access to {% data variables.product.prodname_copilot_short %} from a personal plan or another enterprise, you can use the "Block {% data variables.copilot.copilot_cloud_agent %}" policy.
17+
18+
## Blocking {% data variables.copilot.copilot_cloud_agent %}
19+
20+
>[!NOTE] This enterprise-level policy is a blanket restriction. Organization owners can block {% data variables.copilot.copilot_cloud_agent %} in specific repositories. See [AUTOTITLE](/copilot/how-tos/administer-copilot/manage-for-organization/add-copilot-cloud-agent).
21+
22+
{% data reusables.enterprise-accounts.access-enterprise %}
23+
{% data reusables.enterprise-accounts.ai-controls-tab %}
24+
{% data reusables.enterprise-accounts.cca-policies %}
25+
1. Next to **Block {% data variables.copilot.copilot_cloud_agent %} in all repositories owned by ENTERPRISE-NAME**, click the toggle.
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
---
2+
title: Enabling GitHub Copilot cloud agent in your enterprise
3+
intro: 'Choose which organizations can use {% data variables.copilot.copilot_cloud_agent %} and connect it to MCP servers.'
4+
allowTitleToDifferFromFilename: true
5+
permissions: Enterprise owners and AI managers
6+
product: '{% data reusables.gated-features.copilot-cloud-agent %}<br><a href="https://github.com/enterprise/contact?ref_product=copilot&ref_type=engagement&ref_style=button" target="_blank" class="btn btn-primary mt-3 mr-3 no-underline"><span>Contact Sales</span> {% octicon "link-external" height:16 %}</a>'
7+
versions:
8+
feature: copilot
9+
shortTitle: 'Enable {% data variables.copilot.copilot_cloud_agent %}'
10+
redirect_from:
11+
- /copilot/how-tos/administer-copilot/manage-for-enterprise/manage-agents/manage-copilot-coding-agent
12+
- /copilot/managing-copilot/managing-copilot-for-your-enterprise/adding-copilot-coding-agent-to-enterprise
13+
- /copilot/managing-copilot/managing-copilot-for-your-enterprise/making-copilot-coding-agent-available-to-enterprise
14+
- /copilot/managing-copilot/managing-copilot-for-your-enterprise/managing-copilot-coding-agent-in-your-enterprise
15+
- /copilot/how-tos/administer/enterprises/managing-copilot-coding-agent-in-your-enterprise
16+
- /copilot/how-tos/administer/enterprises/manage-copilot-coding-agent
17+
- /copilot/how-tos/administer/manage-for-enterprise/manage-copilot-coding-agent
18+
- /copilot/how-tos/administer-copilot/manage-for-enterprise/manage-copilot-coding-agent
19+
- /copilot/how-tos/administer-copilot/manage-for-enterprise/manage-agents/manage-copilot-cloud-agent
20+
contentType: how-tos
21+
category:
22+
- Manage Copilot for a team
23+
---
24+
25+
## Prerequisites
26+
27+
You may want to run a trial before enabling {% data variables.copilot.copilot_cloud_agent %} for the enterprise. See [AUTOTITLE](/copilot/tutorials/cloud-agent/pilot-cloud-agent).
28+
29+
## Enabling {% data variables.copilot.copilot_cloud_agent %}
30+
31+
{% data variables.copilot.copilot_cloud_agent %} and use of third-party MCP servers are disabled by default. You can enable these features for users who receive a {% data variables.product.prodname_copilot_short %} license from your enterprise or organizations.
32+
33+
{% data reusables.enterprise-accounts.access-enterprise %}
34+
{% data reusables.enterprise-accounts.ai-controls-tab %}
35+
{% data reusables.enterprise-accounts.cca-policies %}
36+
1. Select a global policy for {% data variables.copilot.copilot_cloud_agent %}, then communicate your decision with your organizations.
37+
38+
>[!TIP] If you select **Enabled for selected organizations**, you can select individual organizations in the UI. To select organizations based on custom properties instead, use the REST API. See [AUTOTITLE](/rest/copilot/copilot-coding-agent-management#selecting-organizations-with-custom-properties).
39+
40+
1. By default, the agent will be available in all repositories in selected organizations. If there are repositories where {% data variables.copilot.copilot_cloud_agent %} should be blocked for all users, tell organization owners to configure this setting. See [AUTOTITLE](/copilot/how-tos/administer-copilot/manage-for-organization/add-copilot-cloud-agent#disabling-or-enabling-copilot-cloud-agent-in-your-repositories).
41+
42+
## Enabling MCP servers
43+
44+
{% data variables.copilot.copilot_cloud_agent %} automatically has access to a small number of default MCP servers. See [AUTOTITLE](/copilot/concepts/agents/cloud-agent/mcp-and-cloud-agent#default-mcp-servers).
45+
46+
You can enable third-party MCP servers to allow developers to integrate {% data variables.copilot.copilot_cloud_agent %} with other services in your DevOps toolchain, such as error-tracking platforms or logging systems.
47+
48+
{% data reusables.enterprise-accounts.view-mcp-policies %}
49+
1. Set a policy for **MCP servers in {% data variables.product.prodname_copilot_short %}**.
50+
51+
>[!NOTE] The "MCP Registry URL" and "Restrict MCP access to registry servers" policies do **not** apply to {% data variables.copilot.copilot_cloud_agent %}.
Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
---
22
title: Managing agents in your enterprise
33
shortTitle: Manage agents
4-
intro: 'Maintain your enterprise''s security and compliance standards and empower your developers by managing your agents.'
4+
intro: Maintain your enterprise's security and compliance standards and empower your developers by managing your agents.
55
versions:
66
feature: copilot
77
children:
88
- /prepare-for-custom-agents
99
- /monitor-agentic-activity
10-
- /manage-copilot-cloud-agent
10+
- /enable-copilot-cloud-agent
11+
- /block-copilot-cloud-agent
1112
- /manage-copilot-code-review
1213
contentType: how-tos
1314
---
15+

0 commit comments

Comments
 (0)