About IP allow lists
By default, authorized users can access your enterprise from any IP address. Enterprise owners can restrict access to assets owned by organizations in an enterprise account by configuring an allow list for specific IP addresses. For example, you can allow access from only the IP address of your office network. The allow list for IP addresses will block access via the web, API, and Git from any IP addresses that are not on the allow list.
You can approve access for a single IP address, or a range of addresses, using CIDR notation. For more information, see "CIDR notation" on Wikipedia.
To enforce the IP allow list, you must first add IP addresses to the list, then enable the IP allow list. You must add your current IP address, or a matching range, before you enable the IP allow list.
You can also configure allowed IP addresses for an individual organization. For more information, see "Managing allowed IP addresses for your organization."
By default, Azure network security group (NSG) rules leave all inbound traffic open on ports 22, 80, 443, and 25. Enterprise owners can contact GitHub Support to configure access restrictions for your instance.
For instance-level restrictions using Azure NSGs, contact GitHub Support with the IP addresses that should be allowed to access your enterprise instance. Specify address ranges using the standard CIDR (Classless Inter-Domain Routing) format. GitHub Support will configure the appropriate firewall rules for your enterprise to restrict network access over HTTP, SSH, HTTPS, and SMTP. For more information, see "Receiving help from GitHub Support."
Adding an allowed IP address
-
In the top-right corner of GitHub AE, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Settings.
-
In the left sidebar, click Security.
-
Under "IP Address", type an IP address, or range of addresses, in CIDR notation.
-
Under "Description", type a description of the allowed IP address or range.
-
Click Add.
Enabling allowed IP addresses
-
In the top-right corner of GitHub AE, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Settings.
-
In the left sidebar, click Security.
-
Under "IP allow list", select Enable IP allow list.
-
Click Save.
Editing an allowed IP address
-
In the top-right corner of GitHub AE, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Settings.
-
In the left sidebar, click Security.
-
Under "IP allow list", to the right of the entry you want to edit, click Edit.
-
Type an IP address, or range of addresses, in CIDR notation.
-
Type a description of the allowed IP address or range.
-
Click Update.
Deleting an allowed IP address
-
In the top-right corner of GitHub AE, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Settings.
-
In the left sidebar, click Security.
-
Under "IP allow list", to the right of the entry you want to delete, click Delete.
-
To permanently delete the entry, click Yes, delete this IP allow list entry.
Using GitHub Actions with an IP allow list
To allow your AE hosted runners to communicate with GitHub, add the IP address or IP address range of your AE hosted runners to the IP allow list. For more information, see "Adding an allowed IP address."
For more information about AE hosted runners, see "About AE hosted runners."