297 Search results for "secrets"
Code security / Secret scanning / Enable features /
Enabling push protection for your repository
With push protection, secret scanning blocks contributors from pushing secrets to a repository and generates an alert whenever a contributor bypasses the
GitHub Actions / Use cases and examples / Deployment /
Deploying to Amazon Elastic Container Service
provider. This will let you stop storing these credentials as long-lived secrets and provide other security benefits. For more information, see "About
GitHub Actions / Write workflows / Choose what workflows do /
Passing information between jobs
are evaluated on the runner at the end of each job. Outputs containing secrets are redacted on the runner and not sent to GitHub Actions.
If an output
GitHub Actions / Write workflows / Choose what workflows do /
Using environments for deployment
deployments with custom deployment protection rules, or limit access to secrets. For more information about creating environments, see "Managing environments
GitHub Actions / Use cases and examples / Deployment /
Deploying Java to Azure App Service
provider. This will let you stop storing these credentials as long-lived secrets and provide other security benefits. For more information, see "About
Get started / Learning about GitHub /
About GitHub Advanced Security
GitHub. See "About the CodeQL CLI."
Secret scanning - Detect secrets, for example keys and tokens, that have been checked into private repositories
GitHub Actions / Write workflows /
About workflows
workflows.
Storing secrets
If your workflows use sensitive data, such as passwords or certificates, you can save these in GitHub as secrets and then use them
Codespaces /
Managing GitHub Codespaces for your organization
limits.
Managing development environment secrets for your repository or organization
Development environment secrets allow you to store sensitive information
Pull requests / Collaborate with pull requests / Working with forks /
Allowing changes to a pull request branch created from a fork
contains GitHub Actions workflows, the option is Allow edits and access to secrets by maintainers. Allowing edits on a fork's branch that contains GitHub Actions
Migrations / GitHub Enterprise Importer / Migrate between GitHub products /
About migrations between GitHub products
Code scanning results
Commit status checks
Dependabot alerts
Dependabot secrets
Discussions at the repository level
Edit history of issue comments and pull