Enable secret scanning for non-provider patterns for enterprises with the REST API
Summary
GitHub Advanced Security customers using secret scanning can now use the REST API to enable or disable support for non-provider patterns at the enterprise level. This enables you to manage…
GitHub Advanced Security customers using secret scanning can now use the REST API to enable or disable support for non-provider patterns at the enterprise level. This enables you to manage your enterprise settings programatically.
The following endpoints have been updated:
– Get code security and analysis features for an enterprise: check if non-provider patterns are enabled for the enterprise
– Update code security and analysis features for an enterprise: enable or disable non-provider patterns for all new repositories in an enterprise
– Enable or disable a security feature: enable or disable non-provider patterns for all existing repositories in an enterprise
Non-provider patterns scans for token types from generic providers, like private keys, auth headers, and connection strings.
Learn more about secret scanning and non-provider patterns.
Join the community discussion and share feedback with us in this dedicated community post.