Skip to content

Commit d98b37a

Browse files
courtneyclCopilotsophietheking
authored
Update permission info for delegated dismissal, supported pattern info - secret scanning (#57714)
Co-authored-by: Copilot <[email protected]> Co-authored-by: Sophie <[email protected]>
1 parent c0cbb4a commit d98b37a

File tree

2 files changed

+16
-6
lines changed

2 files changed

+16
-6
lines changed

content/code-security/secret-scanning/introduction/supported-secret-scanning-patterns.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,6 @@ This table lists the secrets supported by {% data variables.product.prodname_sec
5151

5252
{% data reusables.secret-scanning.non-provider-patterns-beta %}
5353

54-
{% ifversion secret-scanning-ai-generic-secret-detection %}
55-
In addition to these generic non-provider patterns, {% data variables.product.prodname_secret_scanning %} uses {% data variables.product.prodname_copilot_short %} to detect generic passwords. For more information, see [AUTOTITLE](/code-security/secret-scanning/copilot-secret-scanning/responsible-ai-generic-secrets).
56-
{% endif %}
57-
5854
| Provider | Token |
5955
|----------|:--------------------|
6056
| Generic | http_basic_authentication_header |
@@ -66,7 +62,18 @@ In addition to these generic non-provider patterns, {% data variables.product.pr
6662
| Generic | postgres_connection_string |
6763
| Generic | rsa_private_key |
6864

69-
>[!NOTE] Push protection and validity checks are not supported for non-provider patterns.
65+
>[!NOTE] Validity checks are not supported for non-provider patterns.
66+
67+
{% ifversion secret-scanning-ai-generic-secret-detection %}
68+
### {% data variables.secret-scanning.copilot-secret-scanning %}
69+
{% data variables.product.prodname_secret_scanning_caps %} uses {% data variables.product.prodname_copilot_short %} to detect generic passwords. See [AUTOTITLE](/code-security/secret-scanning/copilot-secret-scanning/responsible-ai-generic-secrets).
70+
71+
| Provider | Token |
72+
|----------|:--------------------|
73+
| Generic | password |
74+
75+
>[!NOTE] Push protection and validity checks are not supported for passwords.
76+
{% endif %}
7077

7178
### {% ifversion secret-scanning-alert-experimental-list %}Default{% else %}High confidence{% endif %} patterns
7279

data/reusables/security/delegated-alert-dismissal-intro.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,11 @@ Enabling the feature automatically assigns organization owners and security mana
44

55
* "Review and manage {% data variables.product.prodname_code_scanning %} alert dismissal requests" permission for {% data variables.product.prodname_code_scanning %}.
66

7-
* "Review and manage {% data variables.product.prodname_secret_scanning %} alert dismissal requests" permission for {% data variables.product.prodname_secret_scanning %}. This permission can also be applied to custom roles.
7+
* "Review and manage {% data variables.product.prodname_secret_scanning %} alert dismissal requests" permission for {% data variables.product.prodname_secret_scanning %}. This permission can also be applied to custom roles. Individuals in these custom roles must also have the following permissions, which grant access to alerts in all repositories:
88

9+
* "View {% data variables.product.prodname_secret_scanning %} alerts"
10+
* "Dismiss or reopen {% data variables.product.prodname_secret_scanning %} alerts"
11+
912
For more information about these permissions, see [AUTOTITLE](/organizations/managing-peoples-access-to-your-organization-with-roles/roles-in-an-organization#permissions-for-organization-roles).
1013

1114
To learn more about the security manager role, see [AUTOTITLE](/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).

0 commit comments

Comments
 (0)