Are you sure you want to delete this access key?
title | intro | redirect_from | versions |
---|---|---|---|
Requiring two-factor authentication for an organization | You can require organization members and outside collaborators to enable two-factor authentication for their personal accounts in an organization, making it harder for malicious actors to access an organization's repositories and settings. | [/enterprise/admin/user-management/requiring-two-factor-authentication-for-an-organization] | [{enterprise-server *}] |
When using LDAP or built-in authentication, two-factor authentication is supported on {% data variables.product.product_location %}. Organization administrators can require members to have two-factor authentication enabled.
{% data reusables.enterprise_user_management.external_auth_disables_2fa %}
For more information, see "About two-factor authentication."
Before you can require organization members and outside collaborators to use 2FA, you must [enable two-factor authentication](/enterprise/{{ currentVersion }}/user/articles/securing-your-account-with-two-factor-authentication-2fa/) for your own personal account.
{% warning %}
Warnings:
{% endwarning %}
Before you require use of two-factor authentication, we recommend notifying organization members and outside collaborators and asking them to set up 2FA for their accounts. You can [see if members and outside collaborators already use 2FA](/enterprise/{{ currentVersion }}/user/articles/viewing-whether-users-in-your-organization-have-2fa-enabled) on an organization's People tab.
{% data reusables.profile.enterprise_access_profile %} {% data reusables.profile.access_org %} {% data reusables.organizations.org_settings %} {% data reusables.organizations.security %} {% data reusables.organizations.require_two_factor_authentication %} {% data reusables.organizations.removed_outside_collaborators %}
To view people who were automatically removed from your organization for non-compliance when you required two-factor authentication, you can [search the audit log](/enterprise/{{ currentVersion }}/admin/guides/installation/searching-the-audit-log/) using reason:two_factor_requirement_non_compliance
in the search field.
{% data reusables.audit_log.octicon_icon %}
{% data reusables.enterprise_site_admin_settings.access-settings %}
{% data reusables.audit_log.audit_log_sidebar_for_site_admins %}
4. Enter your search query using reason:two_factor_requirement_non_compliance
.
To narrow your search for:
- Organizations members removed, enter
action:org.remove_member AND reason:two_factor_requirement_non_compliance
- Outside collaborators removed, enter action:org.remove_outside_collaborator AND reason:two_factor_requirement_non_compliance
You can also view people removed from a particular organization by using the organization name in your search:
- org:octo-org AND reason:two_factor_requirement_non_compliance
5. Click Search.
If any members or outside collaborators are removed from the organization when you enable required use of two-factor authentication, they'll receive an email notifying them that they've been removed. They should then enable 2FA for their personal account, and contact an organization owner to request access to your organization.
Press p or to see the previous file or, n or to see the next file
Are you sure you want to delete this access key?
Are you sure you want to delete this access key?
Are you sure you want to delete this access key?
Are you sure you want to delete this access key?