Skip to main content

Managing users in your enterprise

You can audit user activity and manage user settings.
  • Roles in an enterprise

    Everyone in an enterprise is a member of the enterprise. To control access to your enterprise's settings and data, you can assign different roles to members of your enterprise.

  • Best practices for user security

    There are steps your users can take to help protect your enterprise.

  • Viewing people in your enterprise

    To audit access to enterprise-owned resources or user license usage, enterprise owners can view every administrator and member of the enterprise.

  • Auditing users across your enterprise

    The audit log dashboard shows site administrators the actions performed by all users and organizations across your enterprise within the current month and previous six months. The audit log includes details such as who performed the action, what the action was, and when the action was performed.

  • Impersonating a user

    You can impersonate users and perform actions on their behalf, for troubleshooting, unblocking, and other legitimate reasons.

  • Managing dormant users

    By default, a user account is considered to be dormant if it has not been active for 90 days. You can configure the length of time a user must be inactive to be considered dormant.

  • Placing a legal hold on a user or organization

    You can place a legal hold on a user or organization to ensure that repositories they own cannot be permanently removed from your enterprise.

  • Auditing SSH keys

    Site administrators can initiate an instance-wide audit of SSH keys.

  • Customizing user messages for your enterprise

    You can create custom messages that users will see on your enterprise.