LogoLogo
  • Welcome
  • Guides
    • What's Warp?
    • Setup Guide
      • Install the Prerequisites
      • Create and Configure Your Project
      • Set Up Your Vault
      • Scan Your Sources for Repositories
      • Migrate a Repository
  • Product
    • Core Concepts
    • Roadmap
  • Migrations
    • Azure DevOps
      • Service Connections
      • Limitations
    • Bitbucket Server
      • Limitations
  • Using Warp
    • Migration HQ
      • Issues
        • Issue Page
      • Labels
      • Warp.yml
      • Warpspaces
      • Runner Agent
    • Projects
      • Dashboard
      • Team
      • Capacity
      • Settings
    • Slash Commands
      • Global
        • /help
      • Migration
        • /migrate
        • /rename-destination
      • Backlog Issue
        • /refresh
      • Azure DevOps
        • /rewire-pipeline
        • /rewire-all-pipelines
        • /integrate-boards
        • /autolink-work-items
        • /lock-ado-repo
        • /disable-ado-repo
      • GitHub
        • /add-team
    • Support
      • Warp for Copilot
      • Partners
      • Knowledge Base
    • Warp Vault
      • Download Warp Vault
        • Verify Your Copy of Warp Vault
      • Supported Credential Providers
        • Amazon S3 Storage
        • Azure Blob Storage
        • Azure DevOps Services
        • Bitbucket Server
        • GitHub (Destination)
      • Using Credentials in Scripts
        • Vault Schema
          • Amazon S3 Credential Schema
          • Azure Blob Storage Credential Schema
          • Azure DevOps Services Credential Schema
          • Bitbucket Server Credential Schema
          • GitHub (Destination) Credential Schema
  • Warp CLI
  • Security
    • Security at Packfiles
    • Warp's Security Model
      • Credential Management
      • Private Compute
      • Data Privacy
  • Billing & Licensing
    • Overview
    • Free Tier
Powered by GitBook
LogoLogo

Helpful Links

  • Get Warp
  • Terms of Service
  • Privacy Policy

© 2025 Packfiles Inc

On this page
  • Configuration
  • Get the Organization Slug
  • Generate a Personal Access Token for Your Account

Was this helpful?

Edit on GitHub
Export as PDF
  1. Using Warp
  2. Warp Vault
  3. Supported Credential Providers

GitHub (Destination)

How to get your GitHub organization slug and create a GitHub Personal Access Token.

Last updated 1 month ago

Was this helpful?

The GitHub Destination credential type stores the Personal Access Token and configuration associated with the GitHub Organization or Enterprise to which you're migrating data with Warp.

To configure a GitHub Destination credential, you'll need:

  • A Personal Access Token assigned the ,

  • The Organization Slug associated with the token,

  • The days until the token expires, and

  • The GitHub Enterprise Cloud product to which you're migrating.

    • If you're migrating to GitHub Enterprise Cloud with Data Residency, you'll be prompted to provide the tenant URL associated with your Enterprise.

Configuration

Get the Organization Slug

🛠️ Switch to the browser tab or window containing Migration HQ.

Make a note of the URL in your browser’s address bar. The URL contains the organization slug, which is the part of the URL that uniquely identifies the organization. It’s the part of the URL after github.com/ and before /Migration-HQ:

In this example, the URL for the organization’s page is:

github.com/Hypotheticorp01/Migration-HQ

The organization slug is the part that comes after github.com/ and before /Migration-HQ, which means that this example’s organization slug is:

Hypotheticorp01

🛠️ Copy the organization slug from your browser’s address bar and paste it someplace safe — you’ll use it when you create the vault file.

Generate a Personal Access Token for Your Account

🛠️ Switch to the browser tab or window containing Migration HQ and click on your profile picture (located near the top right of the page) so that this menu appears:

🛠️ Select Settings from the menu.

You will be taken to the Settings page for your GitHub account:

🛠️ Scroll down the page until you see the Developer settings item appear in the list on the left side:

🛠️ Click on Developer settings.

This will take you to the Developer Settings page:

🛠️ In the menu on the left side of the page, expand the Personal access tokens item:

🛠️ Select Tokens (classic) from the menu.

You will end up at the Personal access tokens (classic) page:

Towards the top right of the page, you’ll see the Generate new token button.

🛠️ Click the Generate new token button to make its menu appear:

🛠️ ...then select Generate new token (classic) from the menu.

You will arrive at the New personal access token (classic) page, where you’ll need to provide enough information to create a new personal access token:

🛠️ Enter a name or some other text to help you identify the token in the Note field. To make it easier to identify, we suggest you include “Warp” in the name:

For the purposes of this Quickstart, we’ll leave the Expiration field at the default value of 30 days.

🛠️ Under Select scopes, check the following boxes. Checking these boxes will automatically check their sub-boxes:

  • repo

  • workflow

  • write:packages

  • delete:packages

  • admin:org

🛠️ Then scroll down the page and check these boxes. Once again, checking these boxes will automatically check their sub-boxes:

  • admin:repo_hook

  • admin:org_hook

  • delete_repo

Feel free to use the checklist below to double-check that you’ve checked all the necessary checkboxes. It’s important to make sure you’ve checked all of them!

🛠️ Scroll to the bottom of the page and click the Generate token button:

You should now see this page, which will display the personal access token you just created:

🛠️ Copy the token and save it in a safe place — preferably a password manager.

Depending on your GitHub organization settings, you may also need to authorize your personal access token you issued for your Vault with SSO as well.

View screenshot

If you receive an error like the followingResource protected by organization SAML enforcement. You must grant your OAuth token access to this organization. in the terminal or in a runner log, then review your Personal Access Token SSO authorizations as seen above.

Visit and examine the Configure SSOdropdown menu adjacent to your personal access token.

https://github.com/settings/tokens
correct scopes
The browser's address bar, while on the Migration HQ page.
The menu that appears when you click your profile picture.
GitHub account Settings page.
GitHub account Settings page, scrolled farther down.
The Developer Settings page.
The Personal access tokens menu.
The Personal access tokens (classic) page.
The Generate new token menu.
The New personal access token (classic) page.
The Note field and Expiration drop-down menu.
The first set of checkboxes.
The next set of checkboxes.
The Personal access tokens (classic) page, with the newly-created Personal Access Token.
Personal Access Token SSO Config Menu
The menu that appears when you click your profile picture. The key item in the menu is the "Settings" item.
The "Settings" page for the user's GitHub account.
The "Settings" page for the user's GitHub account, scrolled farther down the page. The key item is the “Developer settings” item at the bottom of the left-side menu.
The "Developer Settings" page. The key item is the “Personal access tokens” item at the bottom of the left-side menu.
The Personal access tokens menu. The key item is the “Tokens (classic)” menu item.
The Personal access tokens (classic) page. The key item is the “Generate new token” button.
The Generate new token button's menu. The key item is the “Generate new token (classic)” menu item.
The “New personal access token (classic)” page.
The “Note” field and “Expiration” drop-down menu. The “Note” field contains the text “Warp migration 1” and the “Expiration” drop-down menu has “30 days” selected.
The first section of the checkboxes on the “New personal access token (classic)” page, with the “repo”, “workflow”, “write:packages”, “delete:packages”, and “admin:org” checkboxes checked.
The next section of the checkboxes on the “New personal access token (classic)” page, with the “admin:repo_hook”, “admin:org_hook”, and “delete_repo” checkboxes checked.
The "Generate token" button.
The Personal access tokens (classic) page, with the newly-created Personal Access Token.
Close-up of the browser's address bar, which displays the URL "github.com/Hypotheticorp01".

This will be the only time that this Personal Access Token will be presented to you.

Make sure you’ve copied it someplace safe before clicking the Close button!

Search for the 🛠️ emoji if you’d like to skim through this content while focusing on the steps you need to follow.