Skip to main content

297 Search results for "secrets"

Code security / Secret scanning / Enable features /

Enabling push protection for your repository

With push protection, secret scanning blocks contributors from pushing secrets to a repository and generates an alert whenever a contributor bypasses the

GitHub Actions / Use cases and examples / Deployment /

Deploying to Amazon Elastic Container Service

provider. This will let you stop storing these credentials as long-lived secrets and provide other security benefits. For more information, see "About

GitHub Actions / Write workflows / Choose what workflows do /

Passing information between jobs

are evaluated on the runner at the end of each job. Outputs containing secrets are redacted on the runner and not sent to GitHub Actions. If an output

GitHub Actions / Write workflows / Choose what workflows do /

Using environments for deployment

deployments with custom deployment protection rules, or limit access to secrets. For more information about creating environments, see "Managing environments

GitHub Actions / Use cases and examples / Deployment /

Deploying Java to Azure App Service

provider. This will let you stop storing these credentials as long-lived secrets and provide other security benefits. For more information, see "About

Get started / Learning about GitHub /

About GitHub Advanced Security

GitHub. See "About the CodeQL CLI." Secret scanning - Detect secrets, for example keys and tokens, that have been checked into private repositories

GitHub Actions / Write workflows /

About workflows

workflows. Storing secrets If your workflows use sensitive data, such as passwords or certificates, you can save these in GitHub as secrets and then use them

Codespaces /

Managing GitHub Codespaces for your organization

limits. Managing development environment secrets for your repository or organization Development environment secrets allow you to store sensitive information

Pull requests / Collaborate with pull requests / Working with forks /

Allowing changes to a pull request branch created from a fork

contains GitHub Actions workflows, the option is Allow edits and access to secrets by maintainers. Allowing edits on a fork's branch that contains GitHub Actions

Migrations / GitHub Enterprise Importer / Migrate between GitHub products /

About migrations between GitHub products

Code scanning results Commit status checks Dependabot alerts Dependabot secrets Discussions at the repository level Edit history of issue comments and pull