If an organization only has one owner, the organization's projects can become inaccessible if the owner is unreachable. To ensure that no one will lose access to a project, we recommend that at least two people within each organization have the owner role. For more information, see "Maintaining ownership continuity for your organization."
We recommend using teams to facilitate collaboration in your organization. For more information, see "About teams."
We highly recommend managing team membership through your identity provider (IdP). For more information, see "Managing team synchronization for your organization."
Note: If your enterprise uses Enterprise Managed Users, you do not need to use team synchronization. Instead, you can manage team membership via the SCIM configuration you created while setting up your enterprise. For more information, see "Managing team memberships with identity provider groups."
We recommend keeping teams visible whenever possible and reserving secret teams for sensitive situations. For more information, see "Changing team visibility."
The security overview provides high-level summaries of the security status of an organization or enterprise and make it easy to identify problematic repositories that require intervention. You can also use the security overview to see which repositories have enabled specific security features and to configure any available security features that are not currently in use. For more information, see "About the security overview."