You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: jekyll/_cci2/gh-bb-integration.md
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -58,11 +58,11 @@ Integrated status also appears on the pull request screen, to show that all test
58
58
59
59
- Use Deploy Keys whenever possible.
60
60
- When Deploy Keys cannot be used, Machine User Keys must be used, and have their access restricted to the most limited set of repos and permissions necessary.
61
-
- Never use non-Machine user keys.
61
+
- Never use non-Machine user keys (keys should be associated with the build, not with a specific person).
62
62
- You must rotate the Deploy or User key as part of revoking user access to that repo.
63
-
1. After revoking the user’s access in github, delete deployment key in GitHub.
64
-
2. Delete the deployment key in the CircleCI project.
65
-
3. Regenerate the deployment key in CircleCI project.
63
+
1. After revoking the user’s access in github, delete keys in GitHub.
64
+
2. Delete the keys in the CircleCI project.
65
+
3. Regenerate the keys in CircleCI project.
66
66
- Ensure no developer has access to a build in a repo with a User Key that requires more access than they have.
67
67
68
68
@@ -318,7 +318,7 @@ For this reason, a deploy key isn't sufficiently powerful for projects with addi
318
318
319
319
### What about security?
320
320
321
-
The private keys of the checkout keypairs CircleCI generates never leave the CircleCI systems (only the public key is transmitted to GitHub) and are safely encrypted in storage. However, since they are installed into your build containers, any code that you run in CircleCI can read them and developers that can SSH in will have direct access to this key.
321
+
The private keys of the checkout keypairs CircleCI generates never leave the CircleCI systems (only the public key is transmitted to GitHub) and are safely encrypted in storage. However, since the keys are installed into your build containers, any code that you run in CircleCI can read them. Likewise, developers that can SSH in will have direct access to this key.
322
322
323
323
**Isn't there a difference between deploy keys and user keys?**
0 commit comments