Skip to content
Fetching contributors…
Cannot retrieve contributors at this time
33 lines (16 sloc) 1.72 KB Unpermitted Outside Collaborators

What it does

This Policy Template will get all the Outside Collaborators (User that have been granted access to a repository, but are not a Member of the repository owner's Organization) under Organization(s) and creates an incident for each that are not included in the specified username whitelist.


  1. Organizations to check - Example: flexera
  2. Whitelisted Outside Collaborators - Example: flexera-ci
  3. Email address to send escalation emails to - Example:

Policy Actions

The following policy actions are taken on any resources found to be out of compliance.

  • Send an email report

Required Permissions

This policy requires permissions to access API as the Owner of the Organization(s). Before applying this policy, create a Personal Access Token under the user with Owner role -- adding the repo scopes at minimum, and save the token in the project on Cloud Management as credential named GITHUB_ORG_ADMIN_ACCESS_TOKEN. If you are using other Governance Policies for, you may need to include additional roles to sate the need of all policies which use the same credential. Optionally, you can generate a token with full permission and avoid any issues.

This policy requires permissions to access RightScale resources (credentials). Before applying this policy add the following roles to the user applying the policy. For more information on modifying roles visit the Governance Docs

  • Cloud Management - credential_viewer or admin


This Policy Template does not launch any instances, and so does not incur any cloud costs.

You can’t perform that action at this time.