Skip to main content
All CollectionsOnboarding and Configuration Guides
Onboarding Guide - GitHub Enterprise
Onboarding Guide - GitHub Enterprise
Reco Product Management avatar
Written by Reco Product Management
Updated over 3 weeks ago

The GitHub Enterprise integration allows Reco to access audit logs to find malicious activities on your GitHub Enterprise instance. To set up this integration, please follow these steps:

Prerequisites

  1. A GitHub user that have permissions to generate tokens

  2. A Reco user with Admin Role

Integrate GitHub Enterprise with Reco

  1. Login to GitHub

  2. Navigate to your Git account settings, then Developer Settings. Click the Personal access tokens menu, then click Generate new token (classic) (https://github.com/settings/tokens)

  3. Select this list of scopes: read:org, read:user, read:project, read:audit_log, repo, admin:org_hook, admin:org -> read:org

  4. Click on Generate Token

  5. GitHub will display the personal access token only once. Ensure that you copy the token and store it in a safe space.

  6. Login to the Reco Platform

  7. Click on "Configurations" then click on "Integrations"

  8. Locate the "GitHub Enterprise" object and click on Add Integration

Access to GitHub Copilot Metrics API

In order to have access to endpoints that return a breakdown of aggregated metrics for various GitHub Copilot features, he Copilot Metrics API access policy must be enabled for the organization.

For more information on how to enable this policy see Managing policies for Copilot in your organization or Managing policies and features for Copilot in your enterprise.

  1. Navigate to you GitHub organization settings.

  2. Search for Copilot Policies in the sidebar.

  3. Enable Copilot Metrics API Access.


What do we ingest exactly?

Repository Permissions

Permission

Meaning

Access Type

Administration

Repository creation, deletion, settings, teams, and collaborators

Read-only

Metadata

Search repositories, list collaborators, and access repository metadata

Read-only

Organization Permissions

Permission

Meaning

Access Type

Blocking users

View and manage users blocked by the organization

Read-only

Members

Organization members and teams

Read-only

Projects

Manage projects for an organization

Read-only

Subscribed events

Event

Meaning

Member

Collaborator added to, removed from, or has changed permissions for a repository

Repository

Repository crated, deleted, archived, unarchived, publicized, privatized, edited, renames, or transferred

Organization

Organization deleted, renamed, member invited, member added, or member removed

Public

Repository changes from private to public

Did this answer your question?