Skip to main content

Habilitación de comprobaciones de validez para el repositorio

La habilitación de comprobaciones de validez en el repositorio le ayuda a priorizar la corrección de alertas, ya que indica si un secreto está activo o inactivo.

¿Quién puede utilizar esta característica?

Las comprobaciones de validez de los patrones de asociado están disponibles para los siguientes tipos de repositorio:

  • Repositorios propiedad de la organización en GitHub Team o GitHub Enterprise Cloud con GitHub Secret Protection habilitado

Las comprobaciones de validez de los patrones de socios no están disponibles para Nube de GitHub Enterprise con residencia de datos en GHE.com.

En este artículo

You can enable validity checks for individual repositories through repository settings. Validity checks verify whether detected secrets are still active, helping you prioritize remediation efforts. For information about what validity checks are and how they work, see About validity checks.

Enabling validity checks

  1. On GitHub, navigate to the main page of the repository.

  2. Under your repository name, click Settings. If you cannot see the "Settings" tab, select the dropdown menu, then click Settings.

    Screenshot of a repository header showing the tabs. The "Settings" tab is highlighted by a dark orange outline.

  3. In the "Security" section of the sidebar, click Advanced Security.

  4. Under "Secret Protection", to the right of "Validity checks", click Enable.

  5. Scroll to the bottom of the page and click Save changes.

Nota:

You can also use the REST API to enable validity checks for partner patterns for your repository. For more information, see REST API endpoints for repositories.

Alternatively, organization owners and enterprise administrators can enable the feature for all repositories in the organization or enterprise. For more information on enabling at the organization-level, see Creating a custom security configuration. For more information on enabling at the enterprise-level, see Creating a custom security configuration for your enterprise.

Further reading