You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/admin/overview/setting-up-a-trial-of-github-enterprise-cloud.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ If you invite an existing organization into your trial enterprise, **all of thes
54
54
55
55
## Do I need to provide a payment method?
56
56
57
-
You do not need to provide a payment method to start a trial. If you want to use {% data variables.copilot.copilot_business_short %} during the trial, you can contact {% data variables.contact.github_support %} for approval. Once your request is approved, you will need to provide a credit card for additional validation. You **won't** be charged for using {% data variables.copilot.copilot_business_short %} during the trial.
57
+
You do not need to provide a payment method to start a trial.
Copy file name to clipboardExpand all lines: content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-usage-and-access/giving-org-access-private-registries.md
+28-3Lines changed: 28 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,13 +43,17 @@ You need to be an **organization owner** to set up access to private registries
43
43
1. Use the **URL** and **Type** fields to define the location and type of the registry:
44
44
***URL** is the location where you access the private registry. For example, to use the {% data variables.product.prodname_registry %} registry for NuGet: `https://nuget.pkg.github.com/ORGANIZATION/index.json`, where `ORGANIZATION` is the name of your organization on {% data variables.product.github %}.
45
45
***Type** is the type of registry.
46
-
1. Select either **Token** or **Username and password**, depending on the authentication method, then enter data into the appropriate fields.
47
-
Some types of authentication tokens, such as a {% data variables.product.github %} {% data variables.product.pat_generic_title_case %}, are tied to a particular user identity. Select the **Username and password** option for these and enter the relevant username as **Username** and the token as **Password**.
46
+
1. Select the authentication method for the registry:
47
+
***Token**: Enter the token used to authenticate with the registry.
48
+
***Username and password**: Enter the username and password used to authenticate with the registry. Some types of authentication tokens, such as a {% data variables.product.github %} {% data variables.product.pat_generic_title_case %}, are tied to a particular user identity. Select this option for these and enter the relevant username as **Username** and the token as **Password**.
49
+
{% ifversion org-private-registry-oidc %}
50
+
***OIDC (OpenID Connect)**: Use short-lived credentials from a cloud identity provider instead of storing long-lived secrets. When you select this option, choose a provider and fill in the provider-specific fields. For more information, see [Configuring OIDC authentication for a private registry](#configuring-oidc-authentication-for-a-private-registry).
51
+
{% endif %}
48
52
1. Define which repositories in the organization can access the private registry using these details: all, private and internal, or selected repositories only.
49
53
1. When you have finished defining the private registry, select **Add Registry** to save the registry information.
50
54
51
55
> [!TIP]
52
-
> When you add a private registry to an organization the token or password is stored as an encrypted secret. Once the registry is created, the token or password cannot be viewed again.
56
+
> When you add a private registry to an organization using **Token** or **Username and password** authentication, the token or password is stored as an encrypted secret. Once the registry is created, the token or password cannot be viewed again.
53
57
54
58
### Enabling {% data variables.product.prodname_code_scanning %} default setup to use a registry definition
55
59
@@ -77,6 +81,27 @@ Any private registries used by the build must also be accessible to the workflow
77
81
78
82
When you configure access to one or more private registries, {% data variables.product.prodname_dependabot %} can propose pull requests to upgrade a vulnerable dependency or to maintain a dependency, see [AUTOTITLE](/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot) and [AUTOTITLE](/code-security/dependabot/working-with-dependabot/guidance-for-the-configuration-of-private-registries-for-dependabot).
79
83
84
+
{% ifversion org-private-registry-oidc %}
85
+
86
+
### Configuring OIDC authentication for a private registry
87
+
88
+
OIDC (OpenID Connect) authentication allows {% data variables.product.prodname_dependabot %} to use short-lived credentials from your cloud identity provider to access private registries, eliminating the need to store long-lived secrets. With OIDC, credentials are generated dynamically for each {% data variables.product.prodname_dependabot %} update job. You must configure a trust relationship between your cloud provider and {% data variables.product.github %} before {% data variables.product.prodname_dependabot %} can authenticate.
89
+
90
+
> [!NOTE]
91
+
> OIDC authentication for organization-level private registries is currently supported by {% data variables.product.prodname_dependabot %}. It is not supported by {% data variables.product.prodname_code_scanning %} default setup.
92
+
93
+
When you select **OIDC** as the authentication method for a private registry, choose one of the supported providers and fill in the required fields:
94
+
95
+
***Azure**: Enter the **Tenant ID** (Azure AD tenant ID) and **Client ID** (Azure AD application client ID). You must configure a federated credential in Azure AD that trusts {% data variables.product.github %}'s OIDC provider.
96
+
***AWS CodeArtifact**: Enter the **AWS Region**, **Account ID** (AWS account ID), **Role Name** (IAM role name), **Domain** (CodeArtifact domain), and **Domain Owner** (CodeArtifact domain owner / AWS account ID). You can optionally provide an **Audience**. You must configure an IAM OIDC identity provider in AWS that trusts {% data variables.product.github %}'s OIDC provider.
97
+
***JFrog Artifactory**: Enter the **OIDC Provider Name**. You can optionally provide an **Audience** and **Identity Mapping Name**.
98
+
99
+
The authentication type of a private registry cannot be changed after creation. To switch from OIDC to another authentication method, or vice versa, delete the existing registry and create a new one.
100
+
101
+
For more information about how OIDC works, see [AUTOTITLE](/actions/concepts/security/openid-connect).
102
+
103
+
{% endif %}
104
+
80
105
{% ifversion code-quality %}
81
106
82
107
## {% data variables.product.prodname_code_quality_short %} access to private registries
Copy file name to clipboardExpand all lines: content/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot.md
+12-1Lines changed: 12 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,11 @@ For specific ecosystems, you can configure {% data variables.product.prodname_de
32
32
33
33
{% ifversion org-private-registry %}
34
34
35
-
You can configure {% data variables.product.prodname_dependabot %}'s access to private registries at the org-level. For more information on how to configure that, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/giving-org-access-private-registries).
35
+
You can configure {% data variables.product.prodname_dependabot %}'s access to private registries at the org-level.
36
+
{% ifversion org-private-registry-oidc %}
37
+
Organization-level registries support **Token**, **Username and password**, and **OIDC** authentication.
38
+
{% endif %}
39
+
For more information about configuration, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/giving-org-access-private-registries).
36
40
37
41
{% endif %}
38
42
@@ -126,6 +130,13 @@ If your private registry is configured with an IP allow list, you can find the I
126
130
127
131
With OIDC-based authentication, {% data variables.product.prodname_dependabot %} update jobs can dynamically obtain short-lived credentials from your cloud identity provider, just like {% data variables.product.prodname_actions %} workflows using OIDC federation.
128
132
133
+
{% ifversion org-private-registry-oidc %}
134
+
135
+
> [!TIP]
136
+
> OIDC authentication is also available for **organization-level** private registries, which you can configure through the organization settings UI or the REST API. For more information, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/giving-org-access-private-registries#configuring-oidc-authentication-for-a-private-registry).
137
+
138
+
{% endif %}
139
+
129
140
{% data variables.product.prodname_dependabot %} supports OIDC authentication for any registry type that uses `username` and `password` authentication, when the registry is hosted on one of the following cloud providers:
Copy file name to clipboardExpand all lines: content/copilot/reference/copilot-cli-reference/cli-command-reference.md
+38-1Lines changed: 38 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -317,6 +317,7 @@ Settings cascade from user to repository to local, with more specific scopes ove
317
317
|`compactPaste`|`boolean`|`true`| Collapse large pastes into compact tokens. |
318
318
|`custom_agents.default_local_only`|`boolean`|`false`| Only use local custom agents. |
319
319
|`denied_urls`|`string[]`|`[]`| URLs or domains blocked (takes precedence over `allowed_urls`). |
320
+
|`enabledFeatureFlags`|`object`| — | Enable or disable individual feature flags. Keys are flag names; values are `true` (enable) or `false` (explicitly disable). Takes precedence over the legacy `feature_flags.enabled` array format. See [Feature flag reference](#feature-flag-reference). |
|`includeCoAuthoredBy`|`boolean`|`true`| Add a `Co-authored-by` trailer to git commits made by the agent. |
322
323
|`companyAnnouncements`|`string[]`|`[]`| Custom messages shown randomly on startup. |
@@ -969,6 +970,26 @@ MCP servers are loaded from multiple sources, each with a different trust level.
969
970
970
971
All MCP tool invocations require explicit permission. This applies even to read-only operations on external services.
971
972
973
+
### Migrating from `.vscode/mcp.json`
974
+
975
+
If your project uses `.vscode/mcp.json` (VS Code's MCP configuration format), migrate to `.mcp.json` for {% data variables.copilot.copilot_cli %}. The migration remaps the `servers` key to `mcpServers`.
On Windows, replace `pwsh` with `powershell` if you are using Windows PowerShell instead of PowerShell Core.
992
+
972
993
## Skills reference
973
994
974
995
Skills are Markdown files that extend what the CLI can do. Each skill lives in its own directory containing a `SKILL.md` file. When invoked (via `/SKILL-NAME` or automatically by the agent), the skill's content is injected into the conversation.
@@ -1239,7 +1260,23 @@ When content capture is enabled, the following attributes are populated.
1239
1260
1240
1261
## Feature flag reference
1241
1262
1242
-
Feature flags enable functionality that is not yet generally available. Enable flags via the `COPILOT_CLI_ENABLED_FEATURE_FLAGS` environment variable (comma-separated list) or by using the `/experimental` slash command.
1263
+
Feature flags enable functionality that is not yet generally available. You can enable or disable individual flags in three ways:
1264
+
1265
+
***Environment variable**: Set `COPILOT_CLI_ENABLED_FEATURE_FLAGS` to a comma-separated list of flag names (for example, `"SOME_FEATURE,SOME_OTHER_FEATURE"`).
1266
+
***Slash command**: Use `/experimental on` in an interactive session to enable all experimental-tier flags.
1267
+
***Configuration file**: Add an `enabledFeatureFlags` object to `~/.copilot/config.json`. Set a flag to `true` to enable it or `false` to explicitly disable a flag that would otherwise be enabled by your tier.
1268
+
1269
+
```json
1270
+
{
1271
+
"enabledFeatureFlags": {
1272
+
"SOME_FEATURE": true,
1273
+
"SOME_OTHER_FEATURE": false
1274
+
}
1275
+
}
1276
+
```
1277
+
1278
+
> [!NOTE]
1279
+
> The legacy `feature_flags.enabled` array format is still supported as a fallback, but `enabledFeatureFlags` takes precedence when both are present.
Copy file name to clipboardExpand all lines: content/enterprise-onboarding/getting-started-with-your-enterprise/setting-up-a-trial-of-github-enterprise.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ If you invite an existing organization into your trial enterprise, **all of thes
37
37
38
38
## Do I need to provide a payment method?
39
39
40
-
You do not need to provide a payment method to start a trial. If you want to use {% data variables.copilot.copilot_business_short %} during the trial, you need to provide a credit card. You **won't** be charged for using {% data variables.copilot.copilot_business_short %} during the trial.
40
+
You do not need to provide a payment method to start a trial.
0 commit comments