Skip to content

Commit 8d9deca

Browse files
Merge branch 'main' into patch-2
2 parents 5274e7e + 4257026 commit 8d9deca

508 files changed

Lines changed: 15913 additions & 14396 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.github/workflows/site-policy-reminder.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,8 @@ jobs:
2020
runs-on: ubuntu-latest
2121
steps:
2222
- uses: peter-evans/create-or-update-comment@e8674b075228eee787fea43ef493e45ece1004c9
23-
env:
24-
GITHUB_TOKEN: ${{ secrets.API_TOKEN_SITEPOLICY }}
2523
with:
24+
token: ${{ secrets.DOCS_BOT_PAT_BASE }}
2625
issue-number: ${{ github.event.pull_request.number }}
2726
body: |
2827
Before merging, please remember to change the title of this PR to a description of its changes that is suitable for public viewing on github/site-policy.

.github/workflows/site-policy-sync.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ jobs:
3333
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
3434
with:
3535
repository: github/site-policy
36-
token: ${{ secrets.API_TOKEN_SITEPOLICY }}
36+
token: ${{ secrets.DOCS_BOT_PAT_BASE }}
3737
fetch-depth: ''
3838
path: public-repo
3939

.github/workflows/sync-secret-scanning.yml

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,13 +72,27 @@ jobs:
7272
--title "Sync secret scanning data" \
7373
--body '👋 humans. This PR updates the secret scanning data with the latest changes from github/token-scanning-service.
7474
75-
/cc @github/docs-content-security-products
75+
If CI passes, this PR will be auto-merged. :green_heart:
7676
7777
If CI does not pass or other problems arise, contact #docs-engineering on Slack.' \
7878
--repo github/docs-internal \
79-
--label secret-scanning-pipeline,'skip FR board',ready-for-doc-review,workflow-generated \
79+
--label secret-scanning-pipeline,'skip FR board',workflow-generated \
8080
--head=$branchname
8181
82+
# can't approve your own PR, approve with Actions
83+
echo "Approving pull request..."
84+
unset GITHUB_TOKEN
85+
gh auth login --with-token <<< "${{ secrets.GITHUB_TOKEN }}"
86+
gh pr review --approve
87+
echo "Approved pull request"
88+
89+
# Actions can't merge the PR so back to docs-bot to merge
90+
echo "Setting pull request to auto merge..."
91+
unset GITHUB_TOKEN
92+
gh auth login --with-token <<< "${{ secrets.DOCS_BOT_PAT_BASE }}"
93+
gh pr merge --auto --merge
94+
echo "Set pull request to auto merge"
95+
8296
- uses: ./.github/actions/slack-alert
8397
if: ${{ failure() && github.event_name != 'workflow_dispatch' }}
8498
with:

CHANGELOG.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,29 @@
11
# Docs changelog
22

3+
**19 May 2026**
4+
5+
We published the first iteration of a [journey landing page](https://docs.github.com/en/enterprise-cloud@latest/copilot/get-started/enterprise-ai-governance) for enterprises adopting and governing GitHub Copilot. The journey covers sign-off and adoption, governance of core features, and agent adoption. It includes six newly published guides alongside some refreshed existing content.
6+
7+
<hr>
8+
9+
**16 May 2026**
10+
11+
To help admins understand security configuration statuses, we documented the relationship between organization and enterprise configurations and repositories, including how and why that relationship changes.
12+
13+
- [Security configuration statuses](https://docs.github.com/en/code-security/reference/security-at-scale/security-configuration-statuses) covers all 8 statuses a security configuration can have, with descriptions, causes, and recommended actions
14+
- [Diagnosing security configuration issues](https://docs.github.com/en/code-security/reference/security-at-scale/troubleshoot-security-configurations/diagnosing-security-configuration-issues) now covers `removed` and `removed_by_enterprise` statuses in addition to `failed`
15+
- [About enabling security features at scale](https://docs.github.com/en/code-security/concepts/security-at-scale/about-enabling-security-features-at-scale) explains how configurations relate to repositories over time
16+
17+
<hr>
18+
19+
**15 May 2026**
20+
21+
We've published a new [GitHub Secret Protection adoption journey landing page](https://docs.github.com/en/code-security/tutorials/secret-protection-adoption-path) for AppSec administrators. Our content audit found that while individual GHSP articles existed, there was no clear end-to-end path from evaluation to organization-wide rollout.
22+
23+
The new page organizes existing content into a 5-phase adoption journey: assess secret risk, evaluate fit and cost, pilot with selected repositories, monitor metrics, and scale protection across your organization 🎉
24+
25+
<hr>
26+
327
**12 May 2026**
428

529
We have now published the GitHub Enterprise Server (GHES) 3.21 release candidate notes. You can read the full notes here:
333 KB
Loading

content/account-and-profile/how-tos/account-management/moving-your-work-to-an-organization.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,5 +28,9 @@ If you want your new organization to use your current personal account username,
2828

2929
## Further reading
3030

31+
{% ifversion fpt or ghec %}
3132
- [AUTOTITLE](/organizations/managing-membership-in-your-organization/inviting-users-to-join-your-organization)
33+
{% else %}
34+
- [AUTOTITLE](/organizations/managing-membership-in-your-organization/adding-people-to-your-organization)
35+
{% endif %}
3236
- [AUTOTITLE](/organizations/managing-peoples-access-to-your-organization-with-roles/maintaining-ownership-continuity-for-your-organization)

content/actions/how-tos/troubleshoot-workflows.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -142,6 +142,14 @@ If you use self-hosted runners, you can view their activity and diagnose common
142142

143143
For more information, see [AUTOTITLE](/actions/how-tos/manage-runners/self-hosted-runners/monitor-and-troubleshoot).
144144

145+
{% ifversion fpt or ghec %}
146+
147+
### Runner IP addresses flagged by security scanners
148+
149+
{% data reusables.actions.runner-ip-reputation %}
150+
151+
{% endif %}
152+
145153
## Networking troubleshooting suggestions
146154

147155
Our support is limited for network issues that involve:

content/actions/reference/runners/self-hosted-runners.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Autoscaling allows you to dynamically adjust the number of self-hosted runners b
8888

8989
For more information, see [AUTOTITLE](/actions/hosting-your-own-runners/managing-self-hosted-runners-with-actions-runner-controller/about-actions-runner-controller) and [AUTOTITLE](/actions/hosting-your-own-runners/managing-self-hosted-runners-with-actions-runner-controller/about-support-for-actions-runner-controller).
9090

91-
### {% data variables.product.prodname_actions %} Runner Scale Set Client
91+
### {% data variables.product.prodname_actions %} Runner Scale Set Client
9292

9393
The {% data variables.product.prodname_actions %} Runner Scale Set Client is a standalone Go-based module that empowers platform teams, integrators, and infrastructure providers to build custom autoscaling solutions for {% data variables.product.prodname_actions %} runners across VMs, containers, on-premise infrastructure, and cloud services, with support for Windows, Linux, and macOS platforms.
9494

content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-oidc-for-enterprise-managed-users.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,8 @@ To change the lifetime policy property, you will need the object ID associated w
3636

3737
Support for OIDC is available for customers using Entra ID.
3838

39+
{% data reusables.enterprise-accounts.gov-cloud-idp-not-supported %}
40+
3941
Each Entra ID tenant can support only one OIDC integration with {% data variables.product.prodname_emus %}. If you want to connect Entra ID to more than one enterprise on {% data variables.product.prodname_dotcom %}, use SAML instead. See [AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users).
4042

4143
OIDC does not support IdP-initiated authentication.

content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-saml-single-sign-on-for-enterprise-managed-users.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@ With {% data variables.product.prodname_emus %}, access to your enterprise's res
2727

2828
After you configure SAML SSO, we recommend storing your recovery codes so you can recover access to your enterprise in the event that your IdP is unavailable.
2929

30+
{% data reusables.enterprise-accounts.gov-cloud-idp-not-supported %}
31+
3032
{% data reusables.enterprise_user_management.SAML-to-OIDC-migration-for-EMU %}
3133

3234
## Prerequisites

0 commit comments

Comments
 (0)