Skip to main content

此版本的 GitHub Enterprise Server 将于以下日期停止服务 2026-06-02. 即使针对重大安全问题,也不会发布补丁。 为了获得更好的性能、更高的安全性和新功能,请升级到最新版本的 GitHub Enterprise。 如需升级帮助,请联系 GitHub Enterprise 支持

为企业配置其他机密扫描设置

了解如何为企业配置其他 secret scanning 设置。

谁可以使用此功能?

站点管理员

About additional settings for secret scanning

There are some additional secret scanning settings that cannot be applied to repositories using security configurations, so you must configure these settings separately:

These additional settings apply only to repositories with secret scanning and GitHub Advanced Security both enabled.

Accessing the additional settings for secret scanning

  1. In the top-right corner of GitHub Enterprise Server, click your profile picture, then click Enterprise settings.
  2. On the left side of the page, in the enterprise account sidebar, click Settings.
  3. In the left sidebar, click Code security and analysis.
  4. Scroll down the page to the "Additional settings" section.

To provide context for developers when secret scanning blocks a commit, you can display a link with more information on why the commit was blocked.

  1. Under "Additional settings", in the "Secret scanning" section and to the right of "Resource link for push protection", click .
  2. In the text box, type the link to the desired resource, then click .

Controlling features for new repositories created in a user namespace

To ensure that any repositories created by users outside of an organization are protected by the same security features as repositories created within an organization, you can enable or disable secret scanning features for new repositories created in a user namespace.

Under "Additional settings", use the options in the "User namespace repositories" section to enable or disable features for new repositories.