diff --git a/.github/workflows/reviewers-dependabot.yml b/.github/workflows/reviewers-dependabot.yml deleted file mode 100644 index 8c5855846afa..000000000000 --- a/.github/workflows/reviewers-dependabot.yml +++ /dev/null @@ -1,34 +0,0 @@ -name: Add Dependabot Core Maintainers as Reviewers - -# **What it does**: Automatically add reviewers based on paths, for docs-internal and docs repos. -# **Why we have it**: So dependabot maintainers can be notified about relevant pull requests. -# **Who does it impact**: dependabot-core. - -on: - pull_request: - paths: - - 'data/reusable/dependabot/**' - - 'content/code-security/dependabot/**' - - 'content/rest/dependabot/**' - -jobs: - add-reviewer: - if: github.repository == 'github/docs-internal' || github.repository == 'github/docs' - runs-on: ubuntu-latest - steps: - - name: Check out repo - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 - - - name: Add Dependabot Core Maintainers as reviewers - env: - GH_TOKEN: ${{ secrets.DOCS_BOT_PAT_WRITEORG_PROJECT }} - PR: ${{ github.event.pull_request.html_url }} - run: | - has_reviewer=$( - gh pr view $PR --json reviews | - jq 'any(.reviews[]; select(length > 0))' - ) - if ! $has_reviewer - then - gh pr edit $PR --add-reviewer github/dependabot-core - fi diff --git a/data/reusables/enterprise-accounts/emu-cap-public-preview.md b/data/reusables/enterprise-accounts/emu-cap-public-preview.md index 7ab1d460b663..adcc16b1e947 100644 --- a/data/reusables/enterprise-accounts/emu-cap-public-preview.md +++ b/data/reusables/enterprise-accounts/emu-cap-public-preview.md @@ -1,5 +1,3 @@ >[!NOTE] CAP protection for web sessions is currently in {% data variables.release-phases.public_preview %} and may change. > -> New enterprises that enable IdP CAP support after November 5th, 2024, will have protection for web sessions enabled by default. -> -> Existing enterprises that already enabled IdP CAP support can opt into extended protection for web sessions from their enterprise's "Authentication security" settings. +> If IdP CAP support is already enabled for your enterprise, you can opt into extended protection for web sessions from your enterprise's "Authentication security" settings. To enable this feature, your enterprise must have 1,000 or fewer members, active or suspended.