GitHub Enterprise Server logs error messages for failed SAML authentication in the authentication log at /var/log/github/auth.log. You can review responses in this log file, and you can also configure more verbose logging.
For more information about SAML response requirements, see "SAML configuration reference."
You can configure GitHub Enterprise Server to write verbose debug logs for every SAML authentication attempt. You may be able to troubleshoot failed authentication attempts with this extra output.
- Only enable SAML debugging temporarily, and disable debugging immediately after you finish troubleshooting. If you leave debugging enabled, the size of the file increases much faster than usual, which can negatively impact the performance of GitHub Enterprise Server.
- Test new authentication settings for your GitHub Enterprise Server instance in a staging environment before you apply the settings in your production environment. For more information, see "Setting up a staging instance."
In the top-right corner of GitHub Enterprise Server, click your profile photo, then click Enterprise settings.
In the enterprise account sidebar, click Policies.
Under Policies, click Options.
Under "SAML debugging", select the drop-down and click Enabled.
Attempt to sign into your GitHub Enterprise Server instance through your SAML IdP.
Review the debug output in /var/log/github/auth.log on your GitHub Enterprise Server instance.
When you're done troubleshooting, select the drop-down and click Disabled.
Some output in /var/log/github/auth.log may be Base64-encoded. You can access the administrative shell and use the
base64 utility on your GitHub Enterprise Server instance to decode these responses. For more information, see "Accessing the administrative shell (SSH)."
To decode the output, run the following command, replacing ENCODED_OUTPUT with the encoded output from the log.
base64 --decode ENCODED_OUTPUT
When a user signs into your GitHub Enterprise Server instance for the first time with SAML authentication, GitHub Enterprise Server creates a user account on the instance and maps the SAML
nameid-format to the account.
When the user signs in again, GitHub Enterprise Server compares the account's
nameid-format mapping to the IdP's response. If the
nameid-format in the IdP's response no longer matches the values that GitHub Enterprise Server expects for the user, the sign-in will fail. The user will see the following message.
Another user already owns the account. Please have your administrator check the authentication log.
The message typically indicates that the person's username or email address has changed on the IdP. Ensure that the
nameid-format mapping for the user account on GitHub Enterprise Server matches the user's
nameid-format on your IdP. For more information, see "Updating a user's SAML NameID."
Recipient does not match the ACS URL for your GitHub Enterprise Server instance, one of the following two error messages will appear in the authentication log when a user attempts to authenticate.
Recipient in the SAML response must not be blank.
Recipient in the SAML response was not valid.
Ensure that you set the value for
Recipient on your IdP to the full ACS URL for your GitHub Enterprise Server instance. For example,
If your IdP does not sign the SAML response, or the signature does not match the contents, the following error message will appear in the authentication log.
SAML Response is not signed or has been modified.
Ensure that you configure signed assertions for the GitHub Enterprise Server application on your IdP.
If the IdP's response has a missing or incorrect value for
Audience, the following error message will appear in the authentication log.
Audience is invalid. Audience attribute does not match https://YOUR-INSTANCE-URL
Ensure that you set the value for
Audience on your IdP to the
EntityId for your GitHub Enterprise Server instance, which is the full URL to your instance. For example,
This error can occur when there's too large of a time difference between your IdP and GitHub Enterprise Server, which commonly occurs with self-hosted IdPs.
To prevent this problem, we recommend pointing your appliance to the same Network Time Protocol (NTP) source as your IdP, if possible. If you encounter this error, make sure the time on your appliance is properly synced with your NTP server.
If you use ADFS as your IdP, also set
NotBeforeSkew in ADFS to 1 minute for GitHub. If
NotBeforeSkew is set to 0, even very small time differences, including milliseconds, can cause authentication problems.