Register
Login
Resources
Docs Blog Datasets Glossary Case Studies Tutorials & Webinars
Product
Data Engine LLMs Platform Enterprise
Pricing Explore
Connect to our Discord channel

enabling-saml-single-sign-on-for-organizations-in-your-enterprise-account.md 3.8 KB

You have to be logged in to leave a comment. Sign In
title intro product permissions versions
Enabling SAML single sign-on for organizations in your enterprise account You can control and secure access to resources like repositories, issues, and pull requests by enabling SAML single sign-on (SSO) and centralized authentication through an IdP across all organizations owned by an enterprise account. {% data reusables.gated-features.enterprise-accounts %} Enterprise owners can enable SAML single sign-on for organizations in an enterprise account. [{free-pro-team *}]

About SAML single sign-on for enterprise accounts

{% data reusables.saml.dotcom-saml-explanation %} For more information, see "About identity and access management with SAML single sign-on."

{% data reusables.saml.about-saml-enterprise-accounts %}

{% data reusables.saml.about-saml-access-enterprise-account %} For more information, see "Viewing and managing a user's SAML access to your enterprise account."

{% data reusables.saml.saml-supported-idps %}

{% data reusables.scim.enterprise-account-scim %} If you're not participating in the private beta, SCIM is not supported for enterprise accounts. For more information, see "About user provisioning for organizations in your enterprise account."

Enabling SAML single-sign on for organizations in your enterprise account

{% note %}

Note: Enabling authentication with SAML single sign-on for your enterprise account will override any existing organization-level SAML configurations.

{% endnote %}

For more detailed information about how to enable SAML using Okta, see "Configuring SAML single sign-on and SCIM for your enterprise account using Okta."

{% data reusables.enterprise-accounts.access-enterprise %} {% data reusables.enterprise-accounts.settings-tab %} {% data reusables.enterprise-accounts.security-tab %} 4. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %} 5. Under "SAML single sign-on", select Enable SAML authentication. Checkbox for enabling SAML SSO 6. In the Sign on URL field, type the HTTPS endpoint of your IdP for single sign-on requests. This value is available in your IdP configuration. Field for the URL that members will be forwarded to when signing in 7. Optionally, in the Issuer field, type your SAML issuer URL to verify the authenticity of sent messages. Field for the SAML issuer's name 8. Under Public Certificate, paste a certificate to verify SAML responses. Field for the public certificate from your identity provider 9. To verify the integrity of the requests from your SAML issuer, click {% octicon "pencil" aria-label="The edit icon" %}. Then in the "Signature Method" and "Digest Method" drop-downs, choose the hashing algorithm used by your SAML issuer. Drop-downs for the Signature Method and Digest method hashing algorithms used by your SAML issuer 10. Before enabling SAML SSO for your enterprise, click Test SAML configuration to ensure that the information you've entered is correct. Button to test SAML configuration before enforcing 11. Click Save.

Tip!

Press p or to see the previous file or, n or to see the next file

Comments

Loading...