After you disable SAML SSO or OIDC for your enterprise, the following effects apply:
- All external identities for the enterprise will be removed. For more information, see "Viewing and managing a user's SAML access to your enterprise."
- All managed user accounts will be suspended. The suspended accounts will not be renamed. For more information, see "Viewing people in your enterprise."
- All personal access tokens and SSH keys associated with managed user accounts will be deleted.
- All of the external groups provisioned by SCIM will be deleted. For more information, see "Managing team memberships with identity provider groups."
If you later reconfigure authentication for the enterprise, external groups must be reprovisioned via SCIM, and managed user accounts must be reprovisioned before users can sign in.
Note: When a managed user account is suspended, the user's avatar is permanently deleted. If you reprovision the user, the user will need to reupload their avatar.
If you want to migrate to a new identity provider (IdP) or tenant rather than disabling authentication entirely, see "Migrating your enterprise to a new identity provider or tenant."
Sign into GitHub.com as the setup user for your enterprise with the username @SHORT-CODE_admin, replacing SHORT-CODE with your enterprise's short code.
Attempt to access your enterprise account, and use a recovery code to bypass SAML SSO or OIDC. For more information, see "Accessing your enterprise account if your identity provider is unavailable."
In the top-right corner of GitHub.com, click your profile photo, then click Your enterprises.
In the list of enterprises, click the enterprise you want to view.
In the enterprise account sidebar, click Settings.
Under Settings, click Authentication security.
Under "SAML single sign-on", deselect Require SAML authentication or Require OIDC single sign-on.