Skip to content

Commit 9d18993

Browse files
authored
Merge pull request #42606 from github/repo-sync
Repo sync
2 parents 5a6cdb3 + e91a3ee commit 9d18993

File tree

5 files changed

+5
-6
lines changed

5 files changed

+5
-6
lines changed

content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-saml-single-sign-on-for-enterprise-managed-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ After the initial configuration of SAML SSO, the only setting you can update on
114114
1. Under **Public Certificate**, paste the certificate that you noted while configuring your IdP, to verify SAML responses.
115115

116116
> [!NOTE]
117-
> {% data variables.product.github %} does not enforce the expiration of this SAML IdP certificate. This means that even if this certificate expires, your SAML authentication will continue to work. However, if your IdP administrator regenerates the SAML certificate, and you don't update it on the {% data variables.product.github %} side, users will encounter a `digest mismatch` error during SAML authentication attempts due to the certificate mismatch. See [Error: Digest mismatch](/admin/managing-iam/using-saml-for-enterprise-iam/troubleshooting-saml-authentication#error-digest-mismatch).
117+
> {% data variables.product.github %} does not enforce the expiration of this SAML IdP certificate. This means that even if this certificate expires, your SAML authentication will continue to work. However, {% data variables.product.github %}'s recommendation is to update the certificate before it expires. We will accept a SAML response signed with an expired certificate, but we cannot comment on how the certificate expiring will be handled at the identity provider level. If your IdP administrator regenerates the SAML certificate, and you don't update it on the {% data variables.product.github %} side, users will encounter a `digest mismatch` error during SAML authentication attempts due to the certificate mismatch. See [Error: Digest mismatch](/admin/managing-iam/using-saml-for-enterprise-iam/troubleshooting-saml-authentication#error-digest-mismatch).
118118
1. Under the same **Public Certificate** section, select the **Signature Method** and **Digest Method** dropdown menus, then click the hashing algorithm used by your SAML issuer.
119119
1. Before enabling SAML SSO for your enterprise, to ensure that the information you've entered is correct, click **Test SAML configuration**. {% data reusables.saml.test-must-succeed %}
120120
1. Click **Save SAML settings**.

content/code-security/concepts/secret-security/about-delegated-bypass-for-push-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ With delegated bypass for push protection, you can:
3333

3434
To set up delegated bypass, organization owners or repository administrators create a list of users with bypass privileges. This designated list of users can then:
3535
* Bypass push protection, by specifying a reason for bypassing the block.
36-
* Manage (approve or deny) bypass requests coming from all other contributors. These requests are located in the "Push protection bypass" page in the **Security** tab of the repository, and will expire after 7 days.
36+
* Manage (approve or deny) bypass requests coming from all other contributors. These requests are located in the "Push protection bypass" page in the **Security** tab of the repository, and will expire after 7 days. For more information about bypass requests, see [AUTOTITLE](/code-security/concepts/secret-security/about-bypass-requests-for-push-protection).
3737

3838
The following types of users can always bypass push protection without having to request bypass privileges:
3939
* Organization owners

content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/filtering-repositories-in-your-organization-using-the-repository-table.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,7 @@ redirect_from:
1515
contentType: how-tos
1616
---
1717

18-
## About filtering repositories in your organization
19-
20-
By default, when managing {% data variables.product.prodname_security_configurations %} for repositories in your organization, the repository table displays all repositories in your organization. You can filter the repository table to help you apply and detach {% data variables.product.prodname_security_configurations %}, as well as manage {% data variables.product.prodname_AS %} license usage in your organization.
18+
You can filter the repository table in your organization to quickly find and manage specific repositories when applying {% data variables.product.prodname_security_configurations %} or managing {% data variables.product.prodname_AS %} license usage in the organization. This article explains how to use filters in the repository table.
2119

2220
## Filtering the repository table with the search bar
2321

content/code-security/reference/supply-chain-security/dependabot-options-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -704,7 +704,7 @@ updates:
704704
705705
### `timezone`
706706

707-
Specify a time zone for the `time` value.
707+
Specify a time zone for the `time` value. The default time zone is `UTC`.
708708

709709
The time zone identifier must match a timezone in the database maintained by [iana](https://www.iana.org/time-zones), see [List of tz database time zones](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones).
710710

content/copilot/reference/copilot-allowlist-reference.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,7 @@ The allowlist allows access to the following hosts:
329329
* `playwright.azureedge.net`
330330
* `playwright-akamai.azureedge.net`
331331
* `playwright-verizon.azureedge.net`
332+
* `storage.googleapis.com/chrome-for-testing-public`
332333

333334
### Linux Package Managers: Ubuntu
334335

0 commit comments

Comments
 (0)