Are you sure you want to delete this access key?
title | intro | product | permissions | versions |
---|---|---|---|---|
Enabling SAML single sign-on for organizations in your enterprise account | You can control and secure access to resources like repositories, issues, and pull requests by enabling SAML single sign-on (SSO) and centralized authentication through an IdP across all organizations owned by an enterprise account. | {% data reusables.gated-features.enterprise-accounts %} | Enterprise owners can enable SAML single sign-on for organizations in an enterprise account. | [{free-pro-team *}] |
{% data reusables.saml.dotcom-saml-explanation %} For more information, see "About identity and access management with SAML single sign-on."
{% data reusables.saml.about-saml-enterprise-accounts %}
{% data reusables.saml.about-saml-access-enterprise-account %} For more information, see "Viewing and managing a user's SAML access to your enterprise account."
{% data reusables.saml.saml-supported-idps %}
{% data reusables.scim.enterprise-account-scim %} If you're not participating in the private beta, SCIM is not supported for enterprise accounts. For more information, see "About user provisioning for organizations in your enterprise account."
{% note %}
Note: Enabling authentication with SAML single sign-on for your enterprise account will override any existing organization-level SAML configurations.
{% endnote %}
For more detailed information about how to enable SAML using Okta, see "Configuring SAML single sign-on and SCIM for your enterprise account using Okta."
{% data reusables.enterprise-accounts.access-enterprise %}
{% data reusables.enterprise-accounts.settings-tab %}
{% data reusables.enterprise-accounts.security-tab %}
4. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %}
5. Under "SAML single sign-on", select Enable SAML authentication.
6. In the Sign on URL field, type the HTTPS endpoint of your IdP for single sign-on requests. This value is available in your IdP configuration.
7. Optionally, in the Issuer field, type your SAML issuer URL to verify the authenticity of sent messages.
8. Under Public Certificate, paste a certificate to verify SAML responses.
9. To verify the integrity of the requests from your SAML issuer, click {% octicon "pencil" aria-label="The edit icon" %}. Then in the "Signature Method" and "Digest Method" drop-downs, choose the hashing algorithm used by your SAML issuer.
10. Before enabling SAML SSO for your enterprise, click Test SAML configuration to ensure that the information you've entered is correct.
11. Click Save.
Press p or to see the previous file or, n or to see the next file
Are you sure you want to delete this access key?
Are you sure you want to delete this access key?
Are you sure you want to delete this access key?
Are you sure you want to delete this access key?