You can control access to your organization on GitHub.com and other web applications from one central interface by configuring the organization to use SAML SSO and SCIM with Okta, an Identity Provider (IdP).
Note: To use SAML single sign-on, your organization must use GitHub Enterprise Cloud. For more information about how you can try GitHub Enterprise Cloud for free, see "Setting up a trial of GitHub Enterprise Cloud."
SAML SSO controls and secures access to organization resources like repositories, issues, and pull requests. SCIM automatically adds, manages, and removes members' access to your organization on GitHub.com when you make changes in Okta. For more information, see "About identity and access management with SAML single sign-on" and "About SCIM for organizations."
After you enable SCIM, the following provisioning features are available for any users that you assign your GitHub Enterprise Cloud application to in Okta.
|Push New Users||When you create a new user in Okta, the user will receive an email to join your organization on GitHub.com.|
|Push User Deactivation||When you deactivate a user in Okta, Okta will remove the user from your organization on GitHub.com.|
|Push Profile Updates||When you update a user's profile in Okta, Okta will update the metadata for the user's membership in your organization on GitHub.com.|
|Reactivate Users||When you reactivate a user in Okta, Okta will send an email invitation for the user to rejoin your organization on GitHub.com.|
Alternatively, you can configure SAML SSO for an enterprise using Okta. SCIM for enterprise accounts is only available with Enterprise Managed Users. For more information, see "Configuring SAML single sign-on for your enterprise using Okta" and "Configuring SCIM provisioning with Okta."
- In the Okta Dashboard, expand the Applications menu, then click Applications.
- Click Browse App Catalog.
- Search for the application named "GitHub Enterprise Cloud - Organization."
- Click Add Integration.
- Fill out the form, providing the name of your organization on GitHub and a unique name in the "Application Label" field.
- Assign the application to your user in Okta. For more information, see Assign applications to users in the Okta documentation.
- Under the name of the application, click Sign on.
- Under "SIGN ON METHODS", click View Setup Instructions.
- Enable and test SAML SSO on GitHub using the sign on URL, issuer URL, and public certificates from the "How to Configure SAML 2.0" guide. For more information, see "Enabling and testing SAML single sign-on for your organization."
To use SCIM with your organization, you must use a third-party-owned OAuth app. The OAuth app must be authorized by, and subsequently acts on behalf of, a specific GitHub user. If the user who last authorized this OAuth app leaves or is removed from the organization, SCIM will stop working. To avoid this issue, we recommend creating a dedicated user account to configure SCIM. This user account must be an organization owner and will consume a license.
Sign into GitHub.com using an account that is an organization owner and is ideally used only for SCIM configuration.
To create an active SAML session for your organization, navigate to
https://github.com/orgs/ORGANIZATION-NAME/sso. For more information, see "About authentication with SAML single sign-on."
Navigate to Okta.
In the left sidebar, use the Applications dropdown and click Applications.
In the list of applications, click the label for the application you created for the organization that uses GitHub Enterprise Cloud.
Under the name of the application, click Provisioning.
Click Configure API Integration.
Select Enable API integration.
Click Authenticate with GitHub Enterprise Cloud - Organization.
To the right of your organization's name, click Grant.
Note: If you cannot see your organization, this may be because OAuth app access restrictions are enabled for the organization. To continue, you will need to approve the "OKTA SCIM Integration" app for the organization. For more information, see "Approving OAuth apps for your organization."
Click Authorize OktaOAN.
To avoid syncing errors and confirm that your users have SAML enabled and SCIM linked identities, we recommend you audit your organization's users. For more information, see "Troubleshooting identity and access management for your organization."
To the right of "Provisioning to App", click Edit.
To the right of "Create Users," select Enable.
To the right of "Update User Attributes," select Enable.
To the right of "Deactivate Users," select Enable.
- "Configuring SAML single sign-on for your enterprise using Okta"
- Understanding SAML in the Okta documentation
- Understanding SCIM in the Okta documentation