You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/actions/concepts/security/openid-connect.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,6 +115,20 @@ For more information, see [AUTOTITLE](/actions/reference/openid-connect-referenc
115
115
116
116
{% data variables.product.prodname_actions %} workflows can use OIDC tokens instead of secrets to authenticate with cloud providers. Many popular cloud providers offer official login actions that simplify the process of using OIDC in your workflows. For more information about updating your workflows with specific cloud providers, see [AUTOTITLE](/actions/how-tos/security-for-github-actions/security-hardening-your-deployments).
117
117
118
+
## OIDC support for {% data variables.product.prodname_dependabot %}
119
+
120
+
{% data variables.product.prodname_dependabot %} can use OIDC to authenticate with private registries, eliminating the need to store long-lived credentials as repository secrets. With OIDC-based authentication, {% data variables.product.prodname_dependabot %} update jobs can dynamically obtain short-lived credentials from your cloud identity provider.
121
+
122
+
{% data variables.product.prodname_dependabot %} supports OIDC authentication for any registry type that uses `username` and `password` authentication, when the registry is hosted on AWS CodeArtifact, Azure DevOps Artifacts, or JFrog Artifactory.
123
+
124
+
The benefits of OIDC authentication for {% data variables.product.prodname_dependabot %} are:
125
+
126
+
***Enhanced security:** Eliminates static, long-lived credentials from your repositories.
127
+
***Simpler management:** Enables secure, policy-compliant access to private registries.
128
+
***Avoid rate limiting:** Dynamic credentials help you avoid hitting rate limits associated with static tokens.
129
+
130
+
For more information, see [AUTOTITLE](/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot#using-oidc-for-authentication).
131
+
118
132
## Next steps
119
133
120
134
For more information about configuring OIDC, see [AUTOTITLE](/actions/how-tos/security-for-github-actions/security-hardening-your-deployments).
Copy file name to clipboardExpand all lines: content/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot.md
+65Lines changed: 65 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,6 +124,22 @@ If your private registry is configured with an IP allow list, you can find the I
124
124
125
125
{% endif %}
126
126
127
+
## Using OIDC for authentication
128
+
129
+
{% data variables.product.prodname_dependabot %} can use OpenID Connect (OIDC) to authenticate with private registries, eliminating the need to store long-lived credentials as repository secrets.
130
+
131
+
With OIDC-based authentication, {% data variables.product.prodname_dependabot %} update jobs can dynamically obtain short-lived credentials from your cloud identity provider, just like {% data variables.product.prodname_actions %} workflows using OIDC federation.
132
+
133
+
{% data variables.product.prodname_dependabot %} supports OIDC authentication for any registry type that uses `username` and `password` authentication, when the registry is hosted on one of the following cloud providers:
134
+
135
+
* AWS CodeArtifact
136
+
* Azure DevOps Artifacts
137
+
* JFrog Artifactory
138
+
139
+
To configure OIDC authentication, you need to specify `tenant-id` and `client-id` instead of `username` and `password` in your registry configuration.
140
+
141
+
For more information about how OIDC works, see [AUTOTITLE](/actions/concepts/security/openid-connect).
142
+
127
143
## Allowing external code execution
128
144
129
145
When you give {% data variables.product.prodname_dependabot %} access to one or more registries, external code execution is automatically disabled to protect your code from compromised packages. However, some version updates may fail.
@@ -363,6 +379,22 @@ registries:
363
379
364
380
{% endraw %}
365
381
382
+
You can also use OIDC authentication to access JFrog Artifactory. {% data reusables.dependabot.dependabot-oidc-credentials %}
| `composer-repository` | `username` and `password` |
936
-
| `docker-registry` | `username` and `password` |
937
-
| `git` | `username` and `password` |
935
+
| `composer-repository` | `username` and `password`<br>or OIDC with `tenant-id` and `client-id` |
936
+
| `docker-registry` | `username` and `password`<br>or OIDC with `tenant-id` and `client-id` |
937
+
| `git` | `username` and `password`<br>or OIDC with `tenant-id` and `client-id` |
938
938
| `hex-organization` | `organization` and `key` |
939
939
| `hex-repository` | `repo` and `auth-key` optionally with the corresponding `public-key-fingerprint` |
940
-
| `maven-repository` | `username` and `password` |
941
-
| `npm-registry` | `username` and `password`<br>or `token` |
942
-
| `nuget-feed` | `username` and `password`<br>or `token` |
940
+
| `maven-repository` | `username` and `password`<br>or OIDC with `tenant-id` and `client-id` |
941
+
| `npm-registry` | `username` and `password`<br>or `token`<br>or OIDC with `tenant-id` and `client-id` |
942
+
| `nuget-feed` | `username` and `password`<br>or `token`<br>or OIDC with `tenant-id` and `client-id` |
943
943
| `pub-registry` | `token` |
944
-
| `python-index` | `username` and `password`<br>or `token` |
945
-
| `rubygems-server` | `username` and `password`<br>or `token` |
944
+
| `python-index` | `username` and `password`<br>or `token`<br>or OIDC with `tenant-id` and `client-id` |
945
+
| `rubygems-server` | `username` and `password`<br>or `token`<br>or OIDC with `tenant-id` and `client-id` |
946
946
| `terraform-registry` | `token` |
947
947
948
948
All sensitive data used for authentication should be stored securely and referenced from that secure location, see [AUTOTITLE](/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot).
949
949
950
950
> [!TIP]
951
951
> {% data reusables.dependabot.password-definition %}
952
952
953
+
For more information about OIDC support for {% data variables.product.prodname_dependabot %}, see [AUTOTITLE](/actions/concepts/security/openid-connect#oidc-support-for-dependabot) and [AUTOTITLE](/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot#using-oidc-for-authentication).
954
+
953
955
### `url` and `replaces-base`
954
956
955
957
The `url` parameter defines where to access a registry. When the optional `replaces-base` parameter is enabled (`true`), {% data variables.product.prodname_dependabot %} resolves dependencies using the value of `url` rather than the base URL of that specific ecosystem.
0 commit comments