Is the Enterprise Cloud PAT experience normally this frustrating? #173159
Replies: 2 comments 4 replies
-
| Hi @kaihendry, What you’re seeing is actually expected behaviour for GitHub Enterprise Cloud with Actions and Codespaces. A few points to clarify: 
 So, while it can feel frustrating, this is generally how Enterprise Cloud enforces secure access in automated environments. | 
Beta Was this translation helpful? Give feedback.
-
| Yes, many users report that the Enterprise Cloud PAT setup can feel cumbersome, especially with token scopes and expiration settings. It’s designed for strict security, which adds friction. Once configured correctly, though, it generally works reliably. | 
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Question
Body
Sorry I initially asked on https://www.reddit.com/r/github/comments/1ne5gkz/is_the_enterprise_cloud_pat_experience_normally/
I'm a contractor working on an Github Enterprise Cloud instance and I'm running into a very frustrating experience.
Everytime I want to clone out another repo in the same Org, i.e. in a action with actions/checkout, I need to pass a token: ${{ secrets.PAT_GITHUB_TOKEN }}
Same experience when using Codespaces.
Surely this is a misconfiguration, since normally we can clone Internal Orgs repos, just not in Actions or Code spaces!
PAT = Tied to a personal account right?
Beta Was this translation helpful? Give feedback.
All reactions