Skip to main content
설명서에 자주 업데이트를 게시하며 이 페이지의 번역이 계속 진행 중일 수 있습니다. 최신 정보는 영어 설명서를 참조하세요.

이 버전의 GitHub Enterprise는 다음 날짜에 중단되었습니다. 2023-03-15. 중요한 보안 문제에 대해서도 패치 릴리스가 이루어지지 않습니다. 성능 향상, 향상된 보안, 새로운 기능을 위해 최신 버전의 GitHub Enterprise로 업그레이드합니다. 업그레이드에 대한 도움말은 GitHub Enterprise 지원에 문의하세요.

Connecting with third-party applications

You can connect your GitHub Enterprise Server identity to third-party applications using OAuth. When authorizing one of these applications, you should ensure you trust the application, review who it's developed by, and review the kinds of information the application wants to access.

When a third-party application wants to identify you by your GitHub Enterprise Server login, you'll see a page with the developer contact information and a list of the specific data that's being requested.

Contacting the application developer

Because an application is developed by a third-party who isn't GitHub Enterprise Server, we don't know exactly how an application uses the data it's requesting access to. If you have questions or concerns about an application, you should contact the application developer. To find contact information for an application, you can click the account name of the developer at the top of of the app's authorization page.

If the developer has chosen to supply further information, the right-hand side of the authorization page may also provide a detailed description of the application, as well as its associated website.

Types of application access and data

Applications can have read or write access to your GitHub Enterprise Server data.

  • Read access only allows an application to look at your data.
  • Write access allows an application to change your data.

About OAuth scopes

Scopes are named groups of permissions that an application can request to access both public and non-public data.

When you want to use a third-party application that integrates with GitHub Enterprise Server, that application lets you know what type of access to your data will be required. If you grant access to the application, then the application will be able to perform actions on your behalf, such as reading or modifying data. For example, if you want to use an app that requests user:email scope, the app will have read-only access to your private email addresses. For more information, see "OAuth 앱에 대한 범위."

Note: Currently, you can't scope source code access to read-only.

Tip: 권한 있는 통합을 정기적으로 검토하는 것이 좋습니다. 한동안 사용되지 않은 애플리케이션과 토큰을 제거합니다. 자세한 내용은 "GitHub 앱의 권한 부여 검토 및 취소"을 참조하세요.

Types of requested data

There are several types of data that applications can request.

Type of dataDescription
Commit statusYou can grant access for a third-party application to report your commit status. Commit status access allows applications to determine if a build is a successful against a specific commit. Applications won't have access to your code, but they can read and write status information against a specific commit.
DeploymentsDeployment status access allows applications to determine if a deployment is successful against a specific commit for a repository. Applications won't have access to your code.
GistsGist access allows applications to read or write to both your public and secret Gists.
HooksWebhooks access allows applications to read or write hook configurations on repositories you manage.
NotificationsNotification access allows applications to read your GitHub Enterprise Server notifications, such as comments on issues and pull requests. However, applications remain unable to access anything in your repositories.
Organizations and teamsOrganization and teams access allows apps to access and manage organization and team membership.
Personal user dataUser data includes information found in your user profile, like your name, e-mail address, and location.
RepositoriesRepository information includes the names of contributors, the branches you've created, and the actual files within your repository. An application can request access to all of your repositories of any visibility level. For more information, see "리포지토리 정보."
Repository deleteApplications can request to delete repositories that you administer, but they won't have access to your code.