Skip to main content
Onboarding Guide - GitHub
Reco Product Management avatar
Written by Reco Product Management
Updated over 3 weeks ago

GitHub integration allows Reco to provide visibility and detection of abnormal activities on your code and repositories. With Reco's business context, you can rest assured that your code is protected and secure.

Integrating GitHub with Reco is a simple process that can be done in a few easy steps. If you have GitHub Enterprise subscription and want get the most comprehensive view of your GitHub environment then connect GitHub Enterprise integration instead.

Prerequisites

To integrate GitHub with Reco, make sure you have fulfilled these prerequisites:

  • The GitHub tenant must have a Team plan or above.

  • The user performing the integration must have an Admin user in GitHub

  • The user performing the integration must be a Owner at the relevant organization:

    • Go to the organization page in Github, and go to the People tab.

    • Check that the user is a Owner in the organization.

Integrate GitHub with Reco

  1. Click on Install to install Reco app at this link https://github.com/apps/reco-saas-security.

  2. Select the Organization where you want to install this integration.

  3. Select All repositories and then click Install.

  4. Login to the Reco Platform.

  5. Click on Configurations then click on Integrations

  6. Click on Add Integration and locate the GitHub object

  7. Click Connect

  8. In the redirect screen click Authorize Reco

Access to GitHub Copilot Metrics API

In order to have access to endpoints that return a breakdown of aggregated metrics for various GitHub Copilot features, he Copilot Metrics API access policy must be enabled for the organization.

For more information on how to enable this policy see Managing policies for Copilot in your organization or Managing policies and features for Copilot in your enterprise.

  1. Navigate to you GitHub organization settings.

  2. Search for Copilot Policies in the sidebar.

  3. Enable Copilot Metrics API Access.


What do we ingest exactly?

Repository Permissions

Permission

Meaning

Access Type

Administration

Repository creation, deletion, settings, teams, and collaborators

Read-only

Metadata

Search repositories, list collaborators, and access repository metadata

Read-only

Contents

Repository contents, commits, branches, downloads, releases, and merges.

Read-only

Issues

Issues and related comments, assignees, labels, and milestones.

Read-only

Pull requests

Pull requests and related comments, assignees, labels, milestones, and merges.

Read-only

Organization Permissions

Permission

Meaning

Access Type

Administration

Manage access to an organization.

Read-only

Blocking users

View and manage users blocked by the organization

Read-only

Members

Organization members and teams

Read-only

Projects

Manage projects for an organization

Read-only

Personal access tokens

View personal access tokens that have been granted access to an organization.

Read-only

Subscribed Events

Event

Meaning

Member

Collaborator added to, removed from, or has changed permissions for a repository

Repository

Repository crated, deleted, archived, unarchived, publicized, privatized, edited, renames, or transferred

Organization

Organization deleted, renamed, member invited, member added, or member removed

Public

Repository changes from private to public

Did this answer your question?