docs/policies-and-governance.md
Organizations and enterprises have several existing control mechanisms for the GitHub MCP server on GitHub.com:
This document outlines how these policies apply to different deployment modes, authentication methods, and host applications – while providing guidance for managing GitHub MCP Server access across your organization.
The GitHub MCP Server provides access to GitHub resources and capabilities through a standardized protocol, with flexible deployment and authentication options tailored to different use cases. It supports two deployment modes, both built on the same underlying codebase.
Supported SKUs: Can be used with GitHub Enterprise Server (GHES) and GitHub Enterprise Cloud (GHEC).
Supported Platforms: Currently available only on GitHub Enterprise Cloud (GHEC). Remote hosting for GHES is not supported at this time.
Note: This does not apply to the Local GitHub MCP Server, which uses PATs and does not rely on GitHub App installations.
For integration architecture and implementation details, see the Host Integration Guide.
The GitHub MCP server can be accessed in various environments (referred to as "host" applications):
The MCP server accesses GitHub resources based on the permissions granted through the chosen authentication method (PAT, OAuth, or GitHub App). These may include:
Access is always constrained by GitHub's public API permission model and the authenticated user's privileges.
Important: This policy provides comprehensive control over GitHub MCP Server access in Copilot editors. When disabled, users in affected applications will not be able to use the GitHub MCP Server regardless of deployment mode (remote or local) or authentication method.
Note: As Copilot editors migrate from the "Copilot Editor Preview" policy to the "MCP servers in Copilot" policy, the scope of control becomes more centralized, blocking both remote and local GitHub MCP Server access when disabled. Access in third-party hosts is governed separately by OAuth App, GitHub App, and PAT policies.
Note: The authentication methods available depend on what your host application supports. While PATs work with any remote MCP-compatible host, OAuth and GitHub App authentication are only available if the host has registered an app with GitHub. Check your host application's documentation or support for more info.
Recommendation: We recommend using fine-grained PATs over classic tokens. Classic tokens have broader scopes and can be disabled in organization settings.
Exception: Does NOT apply to GitHub App installation tokens (these are installation-scoped, not user-scoped)
While the GitHub MCP Server provides dynamic tooling and capabilities, the following enterprise governance features are not yet available:
GitHub does not provide a single toggle that blocks all GitHub MCP server traffic for every user. Admins can achieve equivalent coverage by combining the controls shown here:
At present, MCP traffic appears in standard GitHub audit logs as normal API calls. Purpose-built logging for MCP is on the roadmap, but the following views are not yet available:
Until those arrive, teams can continue to monitor MCP activity through existing API log entries and OAuth/GitHub App events.
GitHub App Management
OAuth App Governance
Token Management
Authentication Security
Scope Minimization
MCP:
GitHub Governance & Controls:
Questions or Feedback?
Open an issue in the github-mcp-server repository with the label "policies & governance" attached.
This document reflects GitHub MCP Server policies as of July 2025. Policies and capabilities continue to evolve based on customer feedback and security best practices.