Back to news
devops Priority 4/5 4/24/2026, 11:05:37 AM

GitHub Actions OIDC Tokens Transition to Immutable Subject Claims for New Repositories

GitHub Actions OIDC Tokens Transition to Immutable Subject Claims for New Repositories

GitHub has updated the OpenID Connect (OIDC) token behavior for GitHub Actions by introducing immutable identifiers in the subject claim. This change addresses security concerns where trust relationships previously relied on mutable repository or owner names. By using unique internal IDs instead of names, GitHub prevents potential security vulnerabilities that could occur if a repository is renamed or deleted and its original name is later claimed by another user.

#github#copilot#devops#official

Comparison

AspectBefore / AlternativeAfter / This
Claim ContentHuman-readable repository and owner namesImmutable internal unique identifiers
Renaming ImpactTrust policies may break or allow unauthorized accessTrust remains intact and secure regardless of name changes
Default BehaviorStandard for repositories created before the rolloutAutomatic default for all new repositories
Security PostureVulnerable to repository squatting and name reuseResistant to identity spoofing via name manipulation

Action Checklist

  1. Audit existing OIDC trust policies in cloud providers like AWS, Azure, and GCP Look for policies that strictly filter based on repository name strings
  2. Configure identity provider mappings to recognize the new unique ID format Update the 'sub' claim validation logic to match the immutable ID
  3. Test authentication with a new repository to verify the claim format New repositories will provide the immutable format by default
  4. Manually opt-in existing high-security repositories to the new claim format Ensure all trust policies are updated before switching existing production workflows

Source: GitHub Changelog

This page summarizes the original source. Check the source for full details.

Related