From 08a3bb7d1807b6afd2ef9043a2796ed0d16c230c Mon Sep 17 00:00:00 2001 From: Jeff Widman Date: Tue, 27 Jan 2026 22:18:37 -0800 Subject: [PATCH 1/5] Document that the default time zone for Dependabot config is UTC. (#59378) --- .../supply-chain-security/dependabot-options-reference.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/code-security/reference/supply-chain-security/dependabot-options-reference.md b/content/code-security/reference/supply-chain-security/dependabot-options-reference.md index d3326d77c84a..0bc860665ee8 100644 --- a/content/code-security/reference/supply-chain-security/dependabot-options-reference.md +++ b/content/code-security/reference/supply-chain-security/dependabot-options-reference.md @@ -704,7 +704,7 @@ updates: ### `timezone` -Specify a time zone for the `time` value. +Specify a time zone for the `time` value. The default time zone is `UTC`. The time zone identifier must match a timezone in the database maintained by [iana](https://www.iana.org/time-zones), see [List of tz database time zones](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones). From fef11207a428c91d6372ec3a62a584a7338b12cc Mon Sep 17 00:00:00 2001 From: mc <42146119+mchammer01@users.noreply.github.com> Date: Wed, 28 Jan 2026 06:22:01 +0000 Subject: [PATCH 2/5] [EDI] About delegated bypass for push protection (#59356) --- .../about-delegated-bypass-for-push-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/code-security/concepts/secret-security/about-delegated-bypass-for-push-protection.md b/content/code-security/concepts/secret-security/about-delegated-bypass-for-push-protection.md index ca6af2750419..2f997bb99bb1 100644 --- a/content/code-security/concepts/secret-security/about-delegated-bypass-for-push-protection.md +++ b/content/code-security/concepts/secret-security/about-delegated-bypass-for-push-protection.md @@ -33,7 +33,7 @@ With delegated bypass for push protection, you can: To set up delegated bypass, organization owners or repository administrators create a list of users with bypass privileges. This designated list of users can then: * Bypass push protection, by specifying a reason for bypassing the block. -* Manage (approve or deny) bypass requests coming from all other contributors. These requests are located in the "Push protection bypass" page in the **Security** tab of the repository, and will expire after 7 days. +* Manage (approve or deny) bypass requests coming from all other contributors. These requests are located in the "Push protection bypass" page in the **Security** tab of the repository, and will expire after 7 days. For more information about bypass requests, see [AUTOTITLE](/code-security/concepts/secret-security/about-bypass-requests-for-push-protection). The following types of users can always bypass push protection without having to request bypass privileges: * Organization owners From f834ddf48b25e9e19737483a23d2ee1cbd50e798 Mon Sep 17 00:00:00 2001 From: mc <42146119+mchammer01@users.noreply.github.com> Date: Wed, 28 Jan 2026 06:22:38 +0000 Subject: [PATCH 3/5] [EDI] Filtering repositories in your organization using the repository table (#59354) --- ...itories-in-your-organization-using-the-repository-table.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/filtering-repositories-in-your-organization-using-the-repository-table.md b/content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/filtering-repositories-in-your-organization-using-the-repository-table.md index 1b8d2899c7f1..db1df229329c 100644 --- a/content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/filtering-repositories-in-your-organization-using-the-repository-table.md +++ b/content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/filtering-repositories-in-your-organization-using-the-repository-table.md @@ -15,9 +15,7 @@ redirect_from: contentType: how-tos --- -## About filtering repositories in your organization - -By default, when managing {% data variables.product.prodname_security_configurations %} for repositories in your organization, the repository table displays all repositories in your organization. You can filter the repository table to help you apply and detach {% data variables.product.prodname_security_configurations %}, as well as manage {% data variables.product.prodname_AS %} license usage in your organization. +You can filter the repository table in your organization to quickly find and manage specific repositories when applying {% data variables.product.prodname_security_configurations %} or managing {% data variables.product.prodname_AS %} license usage in the organization. This article explains how to use filters in the repository table. ## Filtering the repository table with the search bar From cccef802b41997ca44dec818f625856937a7fc13 Mon Sep 17 00:00:00 2001 From: Junko Suzuki Date: Wed, 28 Jan 2026 15:50:52 +0900 Subject: [PATCH 4/5] Pnsk/update saml cert info (#59381) Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- ...figuring-saml-single-sign-on-for-enterprise-managed-users.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-saml-single-sign-on-for-enterprise-managed-users.md b/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-saml-single-sign-on-for-enterprise-managed-users.md index 8ee9983540a9..65db008724a8 100644 --- a/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-saml-single-sign-on-for-enterprise-managed-users.md +++ b/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-saml-single-sign-on-for-enterprise-managed-users.md @@ -114,7 +114,7 @@ After the initial configuration of SAML SSO, the only setting you can update on 1. Under **Public Certificate**, paste the certificate that you noted while configuring your IdP, to verify SAML responses. > [!NOTE] - > {% data variables.product.github %} does not enforce the expiration of this SAML IdP certificate. This means that even if this certificate expires, your SAML authentication will continue to work. However, if your IdP administrator regenerates the SAML certificate, and you don't update it on the {% data variables.product.github %} side, users will encounter a `digest mismatch` error during SAML authentication attempts due to the certificate mismatch. See [Error: Digest mismatch](/admin/managing-iam/using-saml-for-enterprise-iam/troubleshooting-saml-authentication#error-digest-mismatch). + > {% data variables.product.github %} does not enforce the expiration of this SAML IdP certificate. This means that even if this certificate expires, your SAML authentication will continue to work. However, {% data variables.product.github %}'s recommendation is to update the certificate before it expires. We will accept a SAML response signed with an expired certificate, but we cannot comment on how the certificate expiring will be handled at the identity provider level. If your IdP administrator regenerates the SAML certificate, and you don't update it on the {% data variables.product.github %} side, users will encounter a `digest mismatch` error during SAML authentication attempts due to the certificate mismatch. See [Error: Digest mismatch](/admin/managing-iam/using-saml-for-enterprise-iam/troubleshooting-saml-authentication#error-digest-mismatch). 1. Under the same **Public Certificate** section, select the **Signature Method** and **Digest Method** dropdown menus, then click the hashing algorithm used by your SAML issuer. 1. Before enabling SAML SSO for your enterprise, to ensure that the information you've entered is correct, click **Test SAML configuration**. {% data reusables.saml.test-must-succeed %} 1. Click **Save SAML settings**. From e91a3eea3a45423025026fbf73e4e7266bc58f55 Mon Sep 17 00:00:00 2001 From: Lawrence Gripper Date: Wed, 28 Jan 2026 08:55:58 +0000 Subject: [PATCH 5/5] Add Google Cloud Storage to CCA allowlist reference (#59280) --- content/copilot/reference/copilot-allowlist-reference.md | 1 + 1 file changed, 1 insertion(+) diff --git a/content/copilot/reference/copilot-allowlist-reference.md b/content/copilot/reference/copilot-allowlist-reference.md index 7216f42cf798..72adb64467c3 100644 --- a/content/copilot/reference/copilot-allowlist-reference.md +++ b/content/copilot/reference/copilot-allowlist-reference.md @@ -329,6 +329,7 @@ The allowlist allows access to the following hosts: * `playwright.azureedge.net` * `playwright-akamai.azureedge.net` * `playwright-verizon.azureedge.net` +* `storage.googleapis.com/chrome-for-testing-public` ### Linux Package Managers: Ubuntu