Org / Enterprise policy to disable “Allow all” in Copilot Chat (VS Code) #191403
Replies: 2 comments
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
Current Policy CapabilitiesAs of today, GitHub does not provide an organization- or enterprise-level policy to disable the “Allow all” or bulk-approval option in Copilot Chat, Copilot Edits, or the VS Code IDE. The approval workflow is intentionally designed to run client-side, giving developers granular control over how they review and apply AI-generated changes. This behavior is consistent across VS Code, JetBrains, and Visual Studio, and differs from the CLI where tool-level allow/deny flags can be scripted. While GitHub has rapidly expanded Copilot policy controls for public-code matching, repository access, and plan assignment, fine-grained approval enforcement remains a product gap for regulated environments. The GitHub Copilot engineering team tracks this internally, and compliance-driven requests like yours are actively influencing their roadmap. Available Admin Controls & Compliance WorkaroundsUntil a native policy is released, you can enforce compliance and mitigate bulk-approval risks using the following strategies:
How to Submit & Track This RequestTo accelerate native policy support, submit your requirement through GitHub’s official channels:
Official Documentation
This control is widely requested by regulated sectors. Combining centralized IDE configuration, strict branch protection, and formal product feedback will help bridge the gap while GitHub develops native policy enforcement. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
🏷️ Discussion Type
Product Feedback
💬 Feature/Topic Area
Other
Body
Problem
We use GitHub Copilot Business in a regulated environment.
Today, when using Copilot Chat in VS Code, users can select “Allow all” (or equivalent bulk‑approval options) when applying Copilot‑suggested edits or actions.
There is currently no organization‑ or enterprise‑level policy to prevent this. Approval behavior is fully user‑controlled in the IDE.
For compliance and risk‑management reasons, we need the ability to enforce per‑action approval and prevent blanket approval of Copilot actions.
Current behavior
Requested feature
Add an organization and/or enterprise‑level Copilot policy that:
This policy should apply at least to:
Why this matters
Scope clarification
We are not asking for Copilot to execute commands automatically.
We are asking for administrative control over approval granularity in IDE Copilot experiences.
Copilot plan
GitHub Copilot Business
Beta Was this translation helpful? Give feedback.
All reactions