Skip to content

Latest commit

 

History

History
23 lines (18 loc) · 1.5 KB

File metadata and controls

23 lines (18 loc) · 1.5 KB
title Security configuration enforcement
intro Understand the complexities of enforcing {% data variables.product.prodname_security_configurations %}.
versions
feature
security-configurations
contentType reference
category
Secure at scale

{% data variables.product.prodname_security_configurations_caps %} can be enforced, meaning repository owners cannot change the enablement status of features that are enabled or disabled by the configuration.

Situations that break enforcement

Some situations can break the enforcement of {% data variables.product.prodname_security_configurations %}. For example, the enablement of {% data variables.product.prodname_code_scanning %} will not apply to a repository if:

  • {% data variables.product.prodname_actions %} is initially enabled on the repository, but is then disabled in the repository.
  • {% data variables.product.prodname_actions %} required by {% data variables.product.prodname_code_scanning %} configurations are not available in the repository.{% ifversion ghes %}
  • Self-hosted runners with the label code-scanning are not available.{% endif %}
  • The definition for which languages should not be analyzed using {% data variables.product.prodname_code_scanning %} default setup is changed.

Enforcement and the REST API

If a user in your organization or enterprise attempts to change the enablement status of a feature in an enforced configuration using the REST API, the API call will appear to succeed, but no enablement statuses will change.