GitHub integration allows Reco to provide visibility and detection of abnormal activities on your code and repositories. With Reco's business context, you can rest assured that your code is protected and secure.
Integrating GitHub with Reco is a simple process that can be done in a few easy steps. If you have GitHub Enterprise subscription and want get the most comprehensive view of your GitHub environment then connect GitHub Enterprise integration instead.
Prerequisites
To integrate GitHub with Reco, make sure you have fulfilled these prerequisites:
The GitHub tenant must have a Team plan or above.
The user performing the integration must have an Admin user in GitHub
The user performing the integration must be a Owner at the relevant organization:
Integrate GitHub with Reco
Click on Install to install Reco app at this link https://github.com/apps/reco-saas-security.
Select the Organization where you want to install this integration.
Select All repositories and then click Install.
Login to the Reco Platform.
Click on Configurations then click on Integrations
Click on Add Integration and locate the GitHub object
Click Connect
In the redirect screen click Authorize Reco
Access to GitHub Copilot Metrics API
In order to have access to endpoints that return a breakdown of aggregated metrics for various GitHub Copilot features, he Copilot Metrics API access policy must be enabled for the organization.
For more information on how to enable this policy see Managing policies for Copilot in your organization or Managing policies and features for Copilot in your enterprise.
Navigate to you GitHub organization settings.
Search for Copilot Policies in the sidebar.
Enable Copilot Metrics API Access.
What do we ingest exactly?
Repository Permissions
Permission | Meaning | Access Type |
Administration | Repository creation, deletion, settings, teams, and collaborators | Read-only |
Metadata | Search repositories, list collaborators, and access repository metadata | Read-only |
Contents | Repository contents, commits, branches, downloads, releases, and merges. | Read-only |
Issues | Issues and related comments, assignees, labels, and milestones. | Read-only |
Pull requests | Pull requests and related comments, assignees, labels, milestones, and merges. | Read-only |
Organization Permissions
Permission | Meaning | Access Type |
Administration | Manage access to an organization. | Read-only |
Blocking users | View and manage users blocked by the organization | Read-only |
Members | Organization members and teams | Read-only |
Projects | Manage projects for an organization | Read-only |
Personal access tokens | View personal access tokens that have been granted access to an organization. | Read-only |
Subscribed Events
Event | Meaning |
Member | Collaborator added to, removed from, or has changed permissions for a repository |
Repository | Repository crated, deleted, archived, unarchived, publicized, privatized, edited, renames, or transferred |
Organization | Organization deleted, renamed, member invited, member added, or member removed |
Public | Repository changes from private to public |