You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
route: POST /orgs/{org}/{security_product}/{enablement}
5
+
scope: orgs
6
+
type: API method
7
+
---
8
+
9
+
# Enable or disable a security feature for an organization
10
+
11
+
Enables or disables the specified security feature for all repositories in an organization.
12
+
13
+
To use this endpoint, you must be an organization owner or be member of a team with the security manager role.
14
+
A token with the 'write:org' scope is also required.
15
+
16
+
GitHub Apps must have the `organization_administration:write` permission to use this endpoint.
17
+
18
+
For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
Whether GitHub Advanced Security is automatically enabled for new repositories.
144
+
145
+
To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
146
+
147
+
You can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request.
Whether Dependabot alerts is automatically enabled for new repositories.
153
+
154
+
To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
155
+
156
+
You can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request.
Whether Dependabot security updates is automatically enabled for new repositories.
162
+
163
+
To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
164
+
165
+
You can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request.
Whether dependency graph is automatically enabled for new repositories.
171
+
172
+
To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
173
+
174
+
You can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request.
Whether secret scanning is automatically enabled for new repositories.
180
+
181
+
To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
182
+
183
+
You can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request.
Whether secret scanning push protection is automatically enabled for new repositories.
189
+
190
+
To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
191
+
192
+
You can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request.
# Create a SSH signing key for the authenticated user
10
+
11
+
Creates an SSH signing key for the authenticated user's GitHub account. You must authenticate with Basic Authentication, or you must authenticate with OAuth with at least `write:ssh_signing_key` scope. For more information, see "[Understanding scopes for OAuth apps](https://docs.github.com/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/)."
The public SSH key to add to your GitHub account. For more information, see "[Checking for existing SSH keys](https://docs.github.com/authentication/connecting-to-github-with-ssh/checking-for-existing-ssh-keys)."
38
+
39
+
</td></tr>
40
+
</tbody>
41
+
</table>
42
+
43
+
See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/users#create-an-ssh-signing-key-for-the-authenticated-user).
# Delete an SSH signing key for the authenticated user
10
+
11
+
Deletes an SSH signing key from the authenticated user's GitHub account. You must authenticate with Basic Authentication, or you must authenticate with OAuth with at least `admin:ssh_signing_key` scope. For more information, see "[Understanding scopes for OAuth apps](https://docs.github.com/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/)."
route: GET /user/ssh_signing_keys/{ssh_signing_key_id}
5
+
scope: users
6
+
type: API method
7
+
---
8
+
9
+
# Get an SSH signing key for the authenticated user
10
+
11
+
Gets extended details for an SSH signing key. You must authenticate with Basic Authentication, or you must authenticate with OAuth with at least `read:ssh_signing_key` scope. For more information, see "[Understanding scopes for OAuth apps](https://docs.github.com/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/)."
# List SSH signing keys for the authenticated user
10
+
11
+
Lists the SSH signing keys for the authenticated user's GitHub account. You must authenticate with Basic Authentication, or you must authenticate with OAuth with at least `read:ssh_signing_key` scope. For more information, see "[Understanding scopes for OAuth apps](https://docs.github.com/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/)."
0 commit comments