Skip to content

Commit 6a8de62

Browse files
committed
Update blog post for 🚢-ing public key scopes
1 parent 155819a commit 6a8de62

1 file changed

Lines changed: 6 additions & 7 deletions

File tree

content/changes/2014-02-10-finer-grained-scopes-for-ssh-keys.md renamed to content/changes/2014-02-24-finer-grained-scopes-for-ssh-keys.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,9 @@
11
---
22
kind: change
33
title: Finer-grained OAuth scopes for SSH keys
4-
created_at: 2014-02-10
4+
created_at: 2014-02-24
55
author_name: jasonrudolph
66
---
7-
8-
**TODO: Set the *real* publication date in the YAML frontmatter and in the file name.**
9-
10-
---
11-
127
Today we're announcing some important changes to the way that API consumers manage SSH keys.
138

149
## Finer-grained OAuth scopes
@@ -21,12 +16,16 @@ In our quest to better enable OAuth applications to only request the permissions
2116

2217
## Upcoming changes to `user` scope
2318

24-
Historically, `user` scope has provided full access to manage a user's SSH keys. Now that we have dedicated scopes for managing a user's SSH keys, we will soon remove those permissions from `user` scope. Starting **(PUBLICATION DATE + 30 DAYS)**, `user` scope will no longer provide access to SSH keys. Applications that need this access should request one of the new scopes described above.
19+
Historically, `user` scope has provided full access to manage a user's SSH keys. Now that we have dedicated scopes for managing a user's SSH keys, we will soon remove those permissions from `user` scope. Starting **March 24, 2014**, `user` scope will no longer provide access to SSH keys. Applications that need this access should request one of the new scopes described above.
2520

2621
## Keys are now immutable
2722

2823
To simplify the security audit trail for SSH keys, we're making keys immutable. API consumers can continue to create keys and delete keys as needed, but keys can no longer be changed. To change an existing key, API consumers should delete the existing key and create a new one with the desired attributes. This change applies both to a [user's SSH keys][user-keys] and a [repository's deploy keys][deploy-keys].
2924

25+
## Deleting keys when revoking a token
26+
27+
In addition, starting today, any keys created via an OAuth token will be
28+
deleted when that token is revoked.
3029

3130
As always, if you have any questions or feedback, [please get in touch][contact].
3231

0 commit comments

Comments
 (0)