About enabling delegated bypass for push protection
Note
Delegated bypass for push protection is currently in beta and subject to change.
Delegated bypass for push protection lets you define contributors who can bypass push protection and adds an approval process for other contributors. For more information, see "About delegated bypass for push protection."
When you enable this feature, you will create a bypass list of roles and teams who can manage requests to bypass push protection. If you don't already have appropriate teams or roles to use, you should create additional teams before you start.
Note
You can't add secret teams to the bypass list.
Alternatively, you can grant specific organization members the ability to review and manage bypass requests using fine-grained permissions, which give you more refined control over which individuals and teams can approve and deny bypass requests. For more information, see "Using fine-grained permissions to control who can review and manage bypass requests."
Configuring delegated bypass for an organization
-
On GitHub, navigate to the main page of the organization.
-
Under your organization name, click Settings. If you cannot see the "Settings" tab, select the dropdown menu, then click Settings.
-
In the "Security" section of the sidebar, click Code security and analysis.
Note
If your organization is enrolled in the security configurations and global settings public beta, instead of "Code security and analysis", you will see a "Code security" dropdown menu. Select Code security, then click Global settings.
-
Under "Code security and analysis", find "GitHub Advanced Security."
-
Under "Push protection", to the right of "Who can bypass push protection for secret scanning", select the dropdown menu, then click Specific roles or teams.
-
Under "Bypass list", click Add role or team.
-
In the dialog box, select the roles and teams that you want to add to the bypass list, then click Add selected.
Configuring delegated bypass for a repository
Note
If an organization owner configures delegated bypass at the organization-level, the repository-level settings are disabled.
-
On GitHub, navigate to the main page of the repository.
-
Under your repository name, click Settings. If you cannot see the "Settings" tab, select the dropdown menu, then click Settings.
-
In the "Security" section of the sidebar, click Code security and analysis.
-
Under "Code security and analysis", find "GitHub Advanced Security."
-
Under "Push protection", to the right of "Who can bypass push protection for secret scanning", select the dropdown menu, then click Specific roles or teams.
-
Under "Bypass list", click Add role or team.
Note
You can't add secret teams to the bypass list.
-
In the dialog box, select the roles and teams that you want to add to the bypass list, then click Add selected.
Using fine-grained permissions to control who can review and manage bypass requests
You can grant specific individuals or teams the ability to review and manage bypass requests using fine-grained permissions.
- Ensure that delegated bypass is enabled for the organization. For more information, follow steps 1-5 in "Configuring delegated bypass for your organization."
- Create (or edit) a custom organization role. For information on creating and editing custom roles, see "Managing custom organization roles."
- When choosing which permissions to add to the custom role, select the "Review and manage secret scanning bypass requests" permission.
- Assign the custom role to individual members or teams in your organization. For more information on assigning custom roles, see "Using organization roles."