The GitHub Enterprise integration allows Reco to access audit logs to find malicious activities on your GitHub Enterprise instance. To set up this integration, please follow these steps:
Prerequisites
A GitHub user that have permissions to generate tokens
A Reco user with Admin Role
Integrate GitHub Enterprise with Reco
Login to GitHub
Navigate to your Git account settings, then Developer Settings. Click the Personal access tokens menu, then click Generate new token (classic) (https://github.com/settings/tokens)
Select this list of scopes:
read:org
,read:user
,read:project
,read:audit_log
,repo
,admin:org_hook
,admin:org -> read:org
Click on Generate Token
GitHub will display the personal access token only once. Ensure that you copy the token and store it in a safe space.
Login to the Reco Platform
Click on "Configurations" then click on "Integrations"
Locate the "GitHub Enterprise" object and click on Add Integration
Access to GitHub Copilot Metrics API
In order to have access to endpoints that return a breakdown of aggregated metrics for various GitHub Copilot features, he Copilot Metrics API access policy must be enabled for the organization.
For more information on how to enable this policy see Managing policies for Copilot in your organization or Managing policies and features for Copilot in your enterprise.
Navigate to you GitHub organization settings.
Search for Copilot Policies in the sidebar.
Enable Copilot Metrics API Access.
What do we ingest exactly?
Repository Permissions
Permission | Meaning | Access Type |
Administration | Repository creation, deletion, settings, teams, and collaborators | Read-only |
Metadata | Search repositories, list collaborators, and access repository metadata | Read-only |
Organization Permissions
Permission | Meaning | Access Type |
Blocking users | View and manage users blocked by the organization | Read-only |
Members | Organization members and teams | Read-only |
Projects | Manage projects for an organization | Read-only |
Subscribed events
Event | Meaning |
Member | Collaborator added to, removed from, or has changed permissions for a repository |
Repository | Repository crated, deleted, archived, unarchived, publicized, privatized, edited, renames, or transferred |
Organization | Organization deleted, renamed, member invited, member added, or member removed |
Public | Repository changes from private to public |