Skip to content

Commit 67e5702

Browse files
Reference removals (#38919)
Co-authored-by: Courtney Wilson <[email protected]>
1 parent 83375e3 commit 67e5702

11 files changed

+13
-20
lines changed

content/admin/user-management/managing-users-in-your-enterprise/best-practices-for-user-security.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For more information on configuring two-factor authentication, see "[AUTOTITLE](
2525

2626
## Requiring a password manager
2727

28-
We strongly recommend requiring your users to install and use a password manager--such as [LastPass](https://lastpass.com/) or [1Password](https://1password.com/)--on any computer they use to connect to your enterprise. Doing so ensures that passwords are stronger and much less likely to be compromised or stolen.
28+
We strongly recommend requiring your users to install and use a password manager on any computer they use to connect to your enterprise. Doing so ensures that passwords are stronger and much less likely to be compromised or stolen.
2929

3030
## Restrict access to teams and repositories
3131

content/authentication/keeping-your-account-and-data-secure/creating-a-strong-password.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ You must choose or generate a password for your account on {% ifversion ghae %}{
2020
- 15 characters long with any combination of characters
2121

2222
To keep your account secure, we recommend you follow these best practices:
23-
- Use a password manager, such as [LastPass](https://lastpass.com/) or [1Password](https://1password.com/), to generate a password of at least 15 characters.
23+
- Use a password manager to generate a password of at least 15 characters.
2424
- Generate a unique password for {% data variables.product.product_name %}. If you use your {% data variables.product.product_name %} password elsewhere and that service is compromised, then attackers or other malicious actors could use that information to access your account on {% ifversion ghae %}{% data variables.product.product_name %}{% else %}{% data variables.location.product_location %}{% endif %}.
2525

2626
- Configure two-factor authentication for your personal account. For more information, see "[AUTOTITLE](/authentication/securing-your-account-with-two-factor-authentication-2fa/about-two-factor-authentication)."

content/authentication/keeping-your-account-and-data-secure/managing-your-personal-access-tokens.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ If you choose to use a {% data variables.product.pat_v1 %}, keep in mind that it
7676
- To access {% data variables.product.company_short %} from the command line, you can use [{% data variables.product.prodname_cli %}](/github-cli/github-cli/about-github-cli) or [Git Credential Manager](https://github.com/GitCredentialManager/git-credential-manager/blob/main/README.md) instead of creating a {% data variables.product.pat_generic %}.
7777
- When using a {% data variables.product.pat_generic %} in a {% data variables.product.prodname_actions %} workflow, consider whether you can use the built-in `GITHUB_TOKEN` instead. For more information, see "[AUTOTITLE](/actions/security-guides/automatic-token-authentication)."
7878

79-
If these options are not possible, and you must create a {% data variables.product.pat_generic %}, consider using another service such as the [1Password CLI](https://developer.1password.com/docs/cli/secret-references/) to store your token securely, or 1Password's [{% data variables.product.company_short %} shell plugin](https://developer.1password.com/docs/cli/shell-plugins/github/) to securely authenticate to {% data variables.product.prodname_cli %}.
79+
If these options are not possible, and you must create a {% data variables.product.pat_generic %}, consider using another CLI service to store your token securely.
8080

8181
When using a {% data variables.product.pat_generic %} in a script, you can store your token as a secret and run your script through {% data variables.product.prodname_actions %}. For more information, see "[AUTOTITLE](/actions/security-guides/encrypted-secrets)."{%- ifversion ghec or fpt %} You can also store your token as a {% data variables.product.prodname_codespaces %} secret and run your script in {% data variables.product.prodname_codespaces %}. For more information, see "[AUTOTITLE](/codespaces/managing-your-codespaces/managing-encrypted-secrets-for-your-codespaces)."{% endif %}
8282

content/authentication/keeping-your-account-and-data-secure/updating-your-github-access-credentials.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ shortTitle: Update access credentials
3939

4040
{% tip %}
4141

42-
To avoid losing your password in the future, we suggest using a secure password manager, like [LastPass](https://lastpass.com/) or [1Password](https://1password.com/).
42+
To avoid losing your password in the future, we suggest using a secure password manager.
4343

4444
{% endtip %}
4545

content/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication-recovery-methods.md

+1-4
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,7 @@ In addition to securely storing your two-factor authentication (2FA) recovery co
2424

2525
{% data reusables.two_fa.about-recovery-codes %} You can also download your recovery codes at any point after enabling two-factor authentication.
2626

27-
To keep your account secure, don't share or distribute your recovery codes. We recommend saving them with a secure password manager, such as:
28-
- [1Password](https://1password.com/)
29-
- [Authy](https://authy.com/)
30-
- [Microsoft Authenticator](https://www.microsoft.com/en-us/security/mobile-authenticator-app)
27+
To keep your account secure, don't share or distribute your recovery codes. We recommend saving them with a secure password manager.
3128

3229
If you generate new recovery codes or disable and re-enable 2FA, the recovery codes in your security settings automatically update.{% ifversion 2fa-reconfiguration-inline-update %} Reconfiguring your 2FA settings without disabling 2FA will not change your recovery codes.{% endif %}
3330

content/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication.md

+1-5
Original file line numberDiff line numberDiff line change
@@ -54,11 +54,7 @@ If you're a member of an {% data variables.enterprise.prodname_emu_enterprise %}
5454

5555
## Configuring two-factor authentication using a TOTP mobile app
5656

57-
A time-based one-time password (TOTP) application automatically generates an authentication code that changes after a certain period of time. We recommend using cloud-based TOTP apps such as:
58-
- [1Password](https://support.1password.com/one-time-passwords/)
59-
- [Authy](https://authy.com/guides/github/)
60-
- [LastPass Authenticator](https://lastpass.com/auth/)
61-
- [Microsoft Authenticator](https://www.microsoft.com/en-us/security/mobile-authenticator-app/)
57+
A time-based one-time password (TOTP) application automatically generates an authentication code that changes after a certain period of time. We recommend using cloud-based TOTP apps.
6258

6359
{% tip %}
6460

content/organizations/managing-saml-single-sign-on-for-your-organization/accessing-your-organization-if-your-identity-provider-is-unavailable.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ topics:
1212
shortTitle: Unavailable identity provider
1313
---
1414

15-
Organization owners can use one of their downloaded or saved recovery codes to bypass single sign-on. You may have saved these to a password manager, such as [LastPass](https://lastpass.com/) or [1Password](https://1password.com/). For more information, see "[AUTOTITLE](/organizations/managing-saml-single-sign-on-for-your-organization/downloading-your-organizations-saml-single-sign-on-recovery-codes)."
15+
Organization owners can use one of their downloaded or saved recovery codes to bypass single sign-on. You may have saved these to a password manager. For more information about downloading recovery codes, see "[AUTOTITLE](/organizations/managing-saml-single-sign-on-for-your-organization/downloading-your-organizations-saml-single-sign-on-recovery-codes)."
1616

1717
{% data reusables.saml.recovery-code-caveats %}
1818

content/organizations/managing-saml-single-sign-on-for-your-organization/downloading-your-organizations-saml-single-sign-on-recovery-codes.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ topics:
1313
shortTitle: Download SAML recovery codes
1414
---
1515

16-
Recovery codes should not be shared or distributed. We recommend saving them with a password manager such as [LastPass](https://lastpass.com/) or [1Password](https://1password.com/).
16+
Recovery codes should not be shared or distributed. We recommend saving them with a password manager.
1717

1818
{% data reusables.profile.access_org %}
1919
{% data reusables.profile.org_settings %}

content/rest/guides/getting-started-with-the-rest-api.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ To keep your token secure, you can store your token as a secret and run your scr
130130

131131
{% ifversion ghec or fpt %}You can also store your token as a {% data variables.product.prodname_codespaces %} secret and run your script in {% data variables.product.prodname_codespaces %}. For more information, see "[AUTOTITLE](/codespaces/managing-your-codespaces/managing-encrypted-secrets-for-your-codespaces)."{% endif %}
132132

133-
If these options are not possible, consider using another service such as [the 1Password CLI](https://developer.1password.com/docs/cli/secret-references/) to store your token securely.
133+
If these options are not possible, consider using another CLI service to store your token securely.
134134

135135
{% endwarning %}
136136

@@ -155,7 +155,7 @@ To help keep your account secure, you can use {% data variables.product.prodname
155155

156156
{% ifversion ghec or fpt %}You can also store your token as a {% data variables.product.prodname_codespaces %} secret and use the command line through {% data variables.product.prodname_codespaces %}. For more information, see "[AUTOTITLE](/codespaces/managing-your-codespaces/managing-encrypted-secrets-for-your-codespaces)."{% endif %}
157157

158-
If these options are not possible, consider using another service such as [the 1Password CLI](https://developer.1password.com/docs/cli/secret-references/) to store your token securely.
158+
If these options are not possible, consider using another CLI service to store your token securely.
159159

160160
{% endwarning %}
161161

content/rest/guides/scripting-with-the-rest-api-and-javascript.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To keep your credentials secure, you can store your credentials as a secret and
3333

3434
{% ifversion ghec or fpt %}You can also store your credentials as a {% data variables.product.prodname_codespaces %} secret and run your script in {% data variables.product.prodname_codespaces %}. For more information, see "[AUTOTITLE](/codespaces/managing-your-codespaces/managing-encrypted-secrets-for-your-codespaces)."{% endif %}
3535

36-
If {% ifversion ghec or fpt %}these options are not possible{% else %}this is not possible{% endif %}, consider using another service such as [the 1Password CLI](https://developer.1password.com/docs/cli/secret-references/) to store your credentials securely.
36+
If {% ifversion ghec or fpt %}these options are not possible{% else %}this is not possible{% endif %}, consider using another CLI service to store your credentials securely.
3737

3838
{% endwarning %}
3939

content/rest/quickstart.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ You can use Octokit.js to interact with the {% data variables.product.prodname_d
130130

131131
You can also store your token as a {% data variables.product.prodname_codespaces %} secret and run your script in {% data variables.product.prodname_codespaces %}. For more information, see "[Managing encrypted secrets for your codespaces](/codespaces/managing-your-codespaces/managing-encrypted-secrets-for-your-codespaces)."{% endif %}
132132

133-
If these options are not possible, consider using another service such as [the 1Password CLI](https://developer.1password.com/docs/cli/secret-references/) to store your token securely.
133+
If these options are not possible, consider using another CLI service to store your token securely.
134134

135135
{% endwarning %}
136136

@@ -297,7 +297,7 @@ If you are authenticating with a {% data variables.product.prodname_github_app %
297297

298298
You can also use {% data variables.product.prodname_cli %} instead of `curl`. {% data variables.product.prodname_cli %} will take care of authentication for you. For more information, see the {% data variables.product.prodname_cli %} version of this page.
299299

300-
If these options are not possible, consider using another service such as [the 1Password CLI](https://developer.1password.com/docs/cli/secret-references/) to store your token securely.
300+
If these options are not possible, consider using another CLI service to store your token securely.
301301

302302
{% endwarning %}
303303

0 commit comments

Comments
 (0)