You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/actions/hosting-your-own-runners/managing-access-to-self-hosted-runners-using-groups.md
+25-5Lines changed: 25 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,17 +33,27 @@ All organizations have a single default self-hosted runner group. Organizations
33
33
34
34
Self-hosted runners are automatically assigned to the default group when created, and can only be members of one group at a time. You can move a runner from the default group to any group you create.
35
35
36
-
When creating a group, you must choose a policy that defines which repositories have access to the runner group. You can configure a runner group to be accessible to a specific list of repositories, all private repositories, or all repositories in the organization.
36
+
When creating a group, you must choose a policy that defines which repositories have access to the runner group.
37
37
38
38
{% data reusables.organizations.navigate-to-org %}
39
39
{% data reusables.organizations.org_settings %}
40
40
{% data reusables.organizations.settings-sidebar-actions %}
41
41
1. In the **Self-hosted runners** section, click **Add new**, and then **New group**.
1. Enter a name for your runner group, and select an access policy from the **Repository access** dropdown list.
44
+
1. Enter a name for your runner group, and assign a policy for repository access.
45
45
46
-

46
+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %} You can configure a runner group to be accessible to a specific list of repositories, or to all repositories in the organization. By default, public repositories can't access runners in a runner group, but you can use the **Allow public repositories** option to override this.{% else if currentVersion == "enterprise-server@2.22"%}You can configure a runner group to be accessible to a specific list of repositories, all private repositories, or all repositories in the organization.{% endif %}
For more information, see "[About self-hosted runners](/actions/hosting-your-own-runners/about-self-hosted-runners#self-hosted-runner-security-with-public-repositories)."
53
+
54
+
{% endwarning %}
55
+
56
+

47
57
1. Click **Save group** to create the group and apply the policy.
48
58
49
59
### Creating a self-hosted runner group for an enterprise
@@ -52,7 +62,7 @@ Enterprises can add their self-hosted runners to groups for access management. E
52
62
53
63
Self-hosted runners are automatically assigned to the default group when created, and can only be members of one group at a time. You can assign the runner to a specific group during the registration process, or you can later move the runner from the default group to a custom group.
54
64
55
-
When creating a group, you must choose a policy that grants access to all organizations in the enterprise or choose specific organizations.
65
+
When creating a group, you must choose a policy that defines which organizations have access to the runner group.
56
66
57
67
{% data reusables.enterprise-accounts.access-enterprise %}
58
68
{% data reusables.enterprise-accounts.policies-tab %}
@@ -61,7 +71,17 @@ When creating a group, you must choose a policy that grants access to all organi
1. Enter a name for your runner group, and select an access policy from the **Organization access** dropdown list.
74
+
1. Enter a name for your runner group, and assign a policy for organization access.
75
+
76
+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %} You can configure a runner group to be accessible to a specific list of organizations, or all organizations in the enterprise. By default, public repositories can't access runners in a runner group, but you can use the **Allow public repositories** option to override this.{% else if currentVersion == "enterprise-server@2.22"%}You can configure a runner group to be accessible to all organizations in the enterprise or choose specific organizations.{% endif %}
For more information, see "[About self-hosted runners](/actions/hosting-your-own-runners/about-self-hosted-runners#self-hosted-runner-security-with-public-repositories)."
83
+
84
+
{% endwarning %}
65
85
66
86

67
87
1. Click **Save group** to create the group and apply the policy.
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.21" or currentVersion == "github-ae@latest" %}
116
116
### Device flow
117
117
118
+
{% if currentVersion ver_lt "enterprise-server@3.1" %}
118
119
{% note %}
119
120
120
-
**Note:** The device flow is in public beta and subject to change.{% if currentVersion == "free-pro-team@latest" %} To enable this beta feature, see "[Activating beta features for apps](/developers/apps/activating-beta-features-for-apps)."{% endif %}
121
+
**Note:** The device flow is in public beta and subject to change.
121
122
122
123
{% endnote %}
124
+
{% endif %}
123
125
124
126
The device flow allows you to authorize users for a headless app, such as a CLI tool or Git credential manager.
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.21" or currentVersion == "github-ae@latest" %}
124
124
### Device flow
125
125
126
+
{% if currentVersion ver_lt "enterprise-server@3.1" %}
126
127
{% note %}
127
128
128
-
**Note:** The device flow is in public beta and subject to change.{% if currentVersion == "free-pro-team@latest" %} To enable this beta feature, see "[Activating beta features for apps](/developers/apps/activating-beta-features-for-apps)."{% endif %}
129
+
**Note:** The device flow is in public beta and subject to change.
129
130
130
131
{% endnote %}
132
+
{% endif %}
131
133
132
134
The device flow allows you to authorize users for a headless app, such as a CLI tool or Git credential manager.
1. In the **Self-hosted runners** section of the settings page, click {% octicon "kebab-horizontal" aria-label="The horizontal kebab icon" %} next to the runner group you'd like to configure, then click **Edit name and [organization|repository] access**.
For more information, see "[About self-hosted runners](/actions/hosting-your-own-runners/about-self-hosted-runners#self-hosted-runner-security-with-public-repositories)."
0 commit comments