•  


Configuring SAML single sign-on for your enterprise using Okta - GitHub Enterprise Cloud Docs
Skip to main content

Configuring SAML single sign-on for your enterprise using Okta

You can use Security Assertion Markup Language (SAML) single sign-on (SSO) with Okta to automatically manage access to your enterprise account on GitHub Enterprise Cloud.

Note : If your enterprise uses Enterprise Managed Users, you must follow a different process to configure SAML single sign-on. For more information, see " Configuring SAML single sign-on for Enterprise Managed Users ."

About SAML with Okta

You can control access to your enterprise account in GitHub Enterprise Cloud and other web applications from one central interface by configuring the enterprise account to use SAML SSO with Okta, an Identity Provider (IdP).

SAML SSO controls and secures access to enterprise account resources like organizations, repositories, issues, and pull requests. For more information, see " Configuring SAML single sign-on for your enterprise ."

Note: You cannot configure SCIM for your enterprise account unless your account was created for Enterprise Managed Users. For more information, see " About Enterprise Managed Users ."

If you do not use Enterprise Managed Users, and you want to use SCIM provisioning, you must configure SAML SSO at the organization level, not the enterprise level. For more information, see " About identity and access management with SAML single sign-on ."

There are special considerations when enabling SAML SSO for your enterprise account if any of the organizations owned by the enterprise account are already configured to use SAML SSO. For more information, see " Switching your SAML configuration from an organization to an enterprise account ."

Alternatively, you can also configure SAML SSO using Okta for an organization that uses GitHub Enterprise Cloud. For more information, see " Configuring SAML single sign-on and SCIM using Okta ."

Adding the GitHub Enterprise Cloud application in Okta

  1. Sign into your Okta account .
  2. Navigate to the GitHub Enterprise Cloud - Enterprise Accounts application in the Okta Integration Network and click Add Integration .
  3. In the left sidebar, use the Applications dropdown and click Applications .
  4. Optionally, to the right of "Application label", type a descriptive name for the application.
  5. To the right of "GitHub Enterprises", type the name of your enterprise account. For example, if your enterprise account's URL is https://github.com/enterprises/octo-corp , type octo-corp .
  6. Click Done .

Enabling and testing SAML SSO

  1. Sign into your Okta account .
  2. In the left sidebar, use the Applications dropdown and click Applications .
  3. Click the label for the application you created for your enterprise account.
  4. Assign the application to your user in Okta. For more information, see Assign applications to users in the Okta documentation.
  5. Under the name of the application, click Sign on .
  6. To the right of Settings, click Edit .
  7. Under "Configured SAML Attributes", to the right of "groups", use the drop-down menu and select Matches regex .
  8. To the right of the drop-down menu, type .*.* .
  9. Click Save .
  10. Under "SIGN ON METHODS", click View Setup Instructions .
  11. Enable SAML for your enterprise account using the information in the setup instructions. For more information, see " Configuring SAML single sign-on for your enterprise ."
- "漢字路" 한글한자자동변환 서비스는 교육부 고전문헌국역지원사업의 지원으로 구축되었습니다.
- "漢字路" 한글한자자동변환 서비스는 전통문화연구회 "울산대학교한국어처리연구실 옥철영(IT융합전공)교수팀"에서 개발한 한글한자자동변환기를 바탕하여 지속적으로 공동 연구 개발하고 있는 서비스입니다.
- 현재 고유명사(인명, 지명등)을 비롯한 여러 변환오류가 있으며 이를 해결하고자 많은 연구 개발을 진행하고자 하고 있습니다. 이를 인지하시고 다른 곳에서 인용시 한자 변환 결과를 한번 더 검토하시고 사용해 주시기 바랍니다.
- 변환오류 및 건의,문의사항은 juntong@juntong.or.kr로 메일로 보내주시면 감사하겠습니다. .
Copyright ⓒ 2020 By '전통문화연구회(傳統文化硏究會)' All Rights reserved.
 한국   대만   중국   일본