Connection Guide
Connect GitHub Advanced Security Without Breaking the Audit Trail
Use this guide to connect GitHub Advanced Security or confirm the export-based path that fits your environment. Aurora keeps source, timestamps, ownership, and collection history attached so the first run becomes reusable proof instead of one-off setup work.
First-Run Checklist
Use this sequence to connect GitHub Advanced Security and make sure the first collection lands cleanly.
- 1Prefer a GitHub App installation with organization Administration read plus repository Code scanning alerts read permissions.
- 2Store organization plus either GitHub App credentials or a fine-grained PAT with equivalent read-only scope.
- 3Validate by listing code-scanning alerts and organization audit-log events.
Credentials and Secrets
The keys, secrets, or tokens Aurora uses to authenticate and collect proof.
Recommended Access
Aurora only asks for the minimum read access needed for collection and checks.
Access requirements depend on the collection mode and scope you choose.