You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/admin/managing-iam/managing-recovery-codes-for-your-enterprise/downloading-your-enterprise-accounts-single-sign-on-recovery-codes.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Downloading your enterprise account's single sign-on recovery codes
3
3
shortTitle: Download recovery codes
4
-
intro: 'To ensure that you can access {% data variables.product.product_name %} if your identity provider (IdP) is unavailable, you should download your enterprise account''s single sign-on (SSO) recovery codes.'
4
+
intro: 'To ensure that you can access {% data variables.product.github %} if your identity provider (IdP) is unavailable, you should download your enterprise account''s single sign-on (SSO) recovery codes.'
Copy file name to clipboardExpand all lines: content/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-authentication-and-provisioning-with-entra-id.md
+6-6
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ For more information, see [AUTOTITLE](/admin/managing-iam/provisioning-user-acco
34
34
## Prerequisites
35
35
36
36
{% ifversion scim-for-ghes-public-beta %}
37
-
The general prerequisites for using SCIM on {% data variables.product.product_name %} apply. See the "Prerequisites" section in [AUTOTITLE](/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users#prerequisites).
37
+
The general prerequisites for using SCIM on {% data variables.product.prodname_ghe_server %} apply. See the "Prerequisites" section in [AUTOTITLE](/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users#prerequisites).
38
38
39
39
In addition:
40
40
@@ -44,7 +44,7 @@ In addition:
44
44
* {% data reusables.saml.ghes-you-must-configure-saml-sso %}
45
45
* {% data reusables.saml.create-a-machine-user %}
46
46
{% endif %}
47
-
* To configure authentication and user provisioning for {% data variables.product.product_name %} using Entra ID, you must have an Entra ID account and tenant. For more information, see the [Entra ID website](https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id) and [Quickstart: Set up a tenant](https://learn.microsoft.com/entra/identity-platform/quickstart-create-new-tenant) in the Microsoft Docs.
47
+
* To configure authentication and user provisioning using Entra ID, you must have an Entra ID account and tenant. For more information, see the [Entra ID website](https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id) and [Quickstart: Set up a tenant](https://learn.microsoft.com/entra/identity-platform/quickstart-create-new-tenant) in the Microsoft Docs.
48
48
49
49
{% ifversion scim-for-ghes-public-beta %}
50
50
@@ -69,9 +69,9 @@ Before starting this section, ensure you have followed steps **1 and 2** in [AUT
69
69
1. In the "SAML certificates" section, download the SAML certificate (Base64).
70
70
1. In the "Set up {% data variables.product.prodname_ghe_server %}" section, make a note of the Login URL and Microsoft Entra Identifier.
71
71
72
-
### On {% data variables.product.product_name %}
72
+
### On {% data variables.product.prodname_ghe_server %}
73
73
74
-
1. Sign in to {% data variables.location.product_location %} as a user with access to the Management Console.
74
+
1. Sign in to {% data variables.product.prodname_ghe_server %} as a user with access to the Management Console.
75
75
1. Configure SAML using the information you have gathered. See [AUTOTITLE](/admin/managing-iam/using-saml-for-enterprise-iam/configuring-saml-single-sign-on-for-your-enterprise#configuring-saml-sso).
76
76
77
77
## 2. Configure SCIM
@@ -100,8 +100,8 @@ When you have finished configuring SCIM, you may want to disable some SAML setti
100
100
101
101
The steps to make a person an enterprise owner depend on whether you only use SAML or also use SCIM. For more information about enterprise owners, see [AUTOTITLE](/admin/user-management/managing-users-in-your-enterprise/roles-in-an-enterprise).
102
102
103
-
If you configured provisioning, to grant the user enterprise ownership in {% data variables.product.product_name %}, assign the enterprise owner role to the user in Entra ID.
103
+
If you configured provisioning, to grant the user enterprise ownership in {% data variables.product.github %}, assign the enterprise owner role to the user in Entra ID.
104
104
105
-
If you did not configure provisioning, to grant the user enterprise ownership in {% data variables.product.product_name %}, include the `administrator` attribute in the SAML assertion for the user account on the IdP, with the value of `true`. For more information about including the `administrator` attribute in the SAML claim from Entra ID, see [How to: customize claims issued in the SAML token for enterprise applications](https://docs.microsoft.com/azure/active-directory/develop/active-directory-saml-claims-customization) in the Microsoft Docs.
105
+
If you did not configure provisioning, to grant the user enterprise ownership in {% data variables.product.github %}, include the `administrator` attribute in the SAML assertion for the user account on the IdP, with the value of `true`. For more information about including the `administrator` attribute in the SAML claim from Entra ID, see [How to: customize claims issued in the SAML token for enterprise applications](https://docs.microsoft.com/azure/active-directory/develop/active-directory-saml-claims-customization) in the Microsoft Docs.
Copy file name to clipboardExpand all lines: content/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-authentication-and-provisioning-with-pingfederate.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ If you're configuring SCIM provisioning for a new enterprise, make sure to compl
39
39
40
40
{% else %}
41
41
42
-
The general prerequisites for using SCIM on {% data variables.product.product_name %} apply. See the "Prerequisites" section in [AUTOTITLE](/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users#prerequisites).
42
+
The general prerequisites for using SCIM on {% data variables.product.prodname_ghe_server %} apply. See the "Prerequisites" section in [AUTOTITLE](/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users#prerequisites).
Copy file name to clipboardExpand all lines: content/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -60,8 +60,8 @@ If you're configuring SCIM provisioning for a new enterprise, make sure to compl
60
60
* For authentication, your instance must use SAML SSO, or a mix of SAML and built-in authentication.
61
61
* You cannot mix SCIM with other external authentication methods. If you use CAS or LDAP, you will need to migrate to SAML before using SCIM.
62
62
* After you have configured SCIM, you must keep SAML authentication enabled to continue using SCIM.
63
-
* You must have administrative access on your IdP to configure user provisioning for {% data variables.product.product_name %}.
64
-
* You must have access to the Management Console on {% data variables.product.product_name %}.
63
+
* You must have administrative access on your IdP.
64
+
* You must have access to the Management Console on {% data variables.product.prodname_ghe_server %}.
65
65
* If you are configuring SCIM on an instance with existing users, ensure you have understood how SCIM will identify and update these users. See [AUTOTITLE](/admin/managing-iam/provisioning-user-accounts-with-scim/user-provisioning-with-scim-on-ghes#what-will-happen-to-existing-users-on-my-instance).
66
66
67
67
{% endif %}
@@ -72,7 +72,7 @@ If you're configuring SCIM provisioning for a new enterprise, make sure to compl
72
72
73
73
To ensure you can continue to sign in and configure settings when SCIM is enabled, you'll create an enterprise owner using built-in authentication.
74
74
75
-
1. Sign in to {% data variables.product.product_name %} as a user with access to the Management Console.
75
+
1. Sign in to {% data variables.product.prodname_ghe_server %} as a user with access to the Management Console.
76
76
1. If you have **already enabled SAML authentication**, ensure your settings allow you to create and promote a built-in setup user. Go to the "Authentication" section of the Management Console and enable the following settings:
77
77
78
78
* Select **Allow creation of accounts with built-in authentication**, so you can create the user.
Copy file name to clipboardExpand all lines: content/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-with-okta.md
+7-7
Original file line number
Diff line number
Diff line change
@@ -39,10 +39,10 @@ Alternatively, if you only intend to use Okta for SAML authentication and you wa
39
39
40
40
| Feature | Description |
41
41
| --- | --- |
42
-
| Push New Users | Users that are assigned to {% ifversion ghec %}the {% data variables.product.prodname_emu_idp_application %}{% else %}{% data variables.product.company_short %}'s{% endif %} application in Okta are automatically created in the enterprise on {% data variables.product.product_name %}. |
43
-
| Push Profile Update | Updates made to the user's profile in Okta will be pushed to {% data variables.product.product_name %}. |
44
-
| Push Groups | Groups in Okta that are assigned to the {% ifversion ghec %}the {% data variables.product.prodname_emu_idp_application %}{% else %}{% data variables.product.company_short %}'s{% endif %} application as Push Groups are automatically created in the enterprise on {% data variables.product.product_name %}. |
45
-
| Push User Deactivation | Unassigning the user from {% ifversion ghec %}the {% data variables.product.prodname_emu_idp_application %}{% else %}{% data variables.product.company_short %}'s{% endif %} application in Okta will disable the user on {% data variables.product.product_name %}. The user will not be able to sign in, but the user's information is maintained. |
42
+
| Push New Users | Users that are assigned to {% ifversion ghec %}the {% data variables.product.prodname_emu_idp_application %}{% else %}{% data variables.product.company_short %}'s{% endif %} application in Okta are automatically created in the enterprise on {% data variables.product.github %}. |
43
+
| Push Profile Update | Updates made to the user's profile in Okta will be pushed to {% data variables.product.github %}. |
44
+
| Push Groups | Groups in Okta that are assigned to the {% ifversion ghec %}the {% data variables.product.prodname_emu_idp_application %}{% else %}{% data variables.product.company_short %}'s{% endif %} application as Push Groups are automatically created in the enterprise on {% data variables.product.github %}. |
45
+
| Push User Deactivation | Unassigning the user from {% ifversion ghec %}the {% data variables.product.prodname_emu_idp_application %}{% else %}{% data variables.product.company_short %}'s{% endif %} application in Okta will disable the user on {% data variables.product.github %}. The user will not be able to sign in, but the user's information is maintained. |
46
46
| Reactivate Users | Users in Okta whose Okta accounts are reactivated and who are assigned back to {% ifversion ghec %}the {% data variables.product.prodname_emu_idp_application %}{% else %}{% data variables.product.company_short %}'s{% endif %} application on Okta will be enabled. |
47
47
48
48
{% ifversion ghec %}
@@ -55,7 +55,7 @@ Alternatively, if you only intend to use Okta for SAML authentication and you wa
55
55
## Prerequisites
56
56
57
57
{% ifversion ghes %}
58
-
The general prerequisites for using SCIM on {% data variables.product.product_name %} apply. See the "Prerequisites" section in [AUTOTITLE](/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users#prerequisites).
58
+
The general prerequisites for using SCIM on {% data variables.product.prodname_ghe_server %} apply. See the "Prerequisites" section in [AUTOTITLE](/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users#prerequisites).
59
59
60
60
In addition:
61
61
@@ -90,7 +90,7 @@ Before starting this section, ensure you have followed steps **1 and 2** in [AUT
90
90
1. On the right side of the page, click **View SAML setup instructions**.
91
91
1. Make a note of the "Sign on URL" and the "Issuer" URL.
92
92
93
-
### On {% data variables.product.product_name %}
93
+
### On {% data variables.product.prodname_ghe_server %}
94
94
95
95
1. Sign in to {% data variables.location.product_location %} as a user with access to the Management Console.
96
96
1. Configure SAML using the information you have gathered. See [AUTOTITLE](/admin/managing-iam/using-saml-for-enterprise-iam/configuring-saml-single-sign-on-for-your-enterprise#configuring-saml-sso).
@@ -150,4 +150,4 @@ You can also automatically manage organization membership by adding groups to th
150
150
151
151
## How do I deprovision users and groups?
152
152
153
-
To remove a user or group from {% data variables.product.product_name %}, remove the user or group from both the "Assignments" tab and the "Push groups" tab in Okta. For users, make sure the user is removed from all groups in the "Push Groups" tab.
153
+
To remove a user or group from {% data variables.product.github %}, remove the user or group from both the "Assignments" tab and the "Push groups" tab in Okta. For users, make sure the user is removed from all groups in the "Push Groups" tab.
0 commit comments