Skip to content

Commit c9e7677

Browse files
lildudeCopilotvgrl
authored
Add Changes section and note to 3.14.0 release notes for change in scope for user org membership (#56660)
Co-authored-by: Copilot <[email protected]> Co-authored-by: Vanessa <[email protected]>
1 parent 3a068c9 commit c9e7677

File tree

1 file changed

+7
-1
lines changed
  • data/release-notes/enterprise-server/3-14

1 file changed

+7
-1
lines changed

data/release-notes/enterprise-server/3-14/0.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,10 @@ sections:
168168
- |
169169
When using a JSON Web Token (JWT) to authenticate or request an installation token, developers of GitHub Apps can use the app's client ID for the JWT's `iss` claim. The application ID remains valid, but is considered deprecated.
170170
171+
changes:
172+
- |
173+
The API endpoint for setting and removing organization membership for a user (`PUT /orgs/{org}/memberships/{username}` and `DELETE /orgs/{org}/memberships/{username}`) requires `admin:org` permissions for classic tokens. Previously, the changes were allowed with the `read:org, repo` permissions. [Updated: 2025-07-16]
174+
171175
known_issues:
172176
- |
173177
Complete SCIM payloads are written to the audit log, including SCIM attributes that are not required or supported per [API docs](/rest/enterprise-admin/scim?apiVersion=2022-11-28#supported-scim-user-attributes). Customers using Okta with SCIM may notice that a placeholder password attribute is among the data passed to audit logs in its current configuration. This placeholder data is associated with Okta’s password synchronization feature that is not expected or required by GitHub. See [okta-scim](https://developer.okta.com/docs/api/openapi/okta-scim/guides/scim-20/#create-the-user) for more information.
@@ -244,5 +248,7 @@ sections:
244248
These release notes previously did not include a note for the deprecation of team discussions.
245249
- |
246250
These release notes previously indicated as a known issue that on GitHub Enterprise Server 3.14.0, repositories originally imported using `ghe-migrator` will not correctly track Advanced Security contributions.
247-
251+
248252
The fix for this problem was already included in GitHub Enterprise Server [3.12](/admin/release-notes#3.12.0-bugs). [Updated: 2025-04-11]
253+
- |
254+
The release notes previously did not include a note for the change in permissions required for managing user organization membership. [Updated: 2025-07-16]

0 commit comments

Comments
 (0)