To maintain the security of your account when you perform a potentially sensitive action on GitHub.com, you must authenticate even though you're already signed in. For example, GitHub considers the following actions sensitive because each action could allow a new person or system to access your account.
- Modification of an associated email address
- Authorization of a third-party application
- Addition of a new SSH key
After you authenticate to perform a sensitive action, your session is temporarily in "sudo mode." In sudo mode, you can perform sensitive actions without authentication. GitHub Enterprise Cloud will wait a few hours before prompting you for authentication again. During this time, any sensitive action that you perform will reset the timer.
"sudo" is a reference to a program on Unix systems, where the name is short for "superuser do." For more information, see sudo on Wikipedia.
To confirm access for sudo mode, you can authenticate with your password. Optionally, you can use a different authentication method, like a security key, GitHub Mobile, or a 2FA code.
- Confirming access using a security key
- Confirming access using GitHub Mobile
- Confirming access using a 2FA code
- Confirming access using your password
You must configure two-factor authentication (2FA) for your account using a security key to confirm access to your account for sudo mode using the security key. For more information, see "Configuring two-factor authentication."
When prompted to authenticate for sudo mode, click Use security key, then follow the prompts.
You must install and sign into GitHub Mobile to confirm access to your account for sudo mode using the app. For more information, see "GitHub Mobile."
When prompted to authenticate for sudo mode, click Use GitHub Mobile.
Open GitHub Mobile. GitHub Mobile will display numbers that you must enter on GitHub.com to approve the request.
On GitHub Enterprise Cloud, type the numbers displayed in GitHub Mobile.
You must configure 2FA using a TOTP mobile app or text messages to confirm access to your account for sudo mode using a 2FA code. For more information, see "Configuring two-factor authentication."
When prompted to authenticate for sudo mode, type the authentication code from your TOTP mobile app or the text message, then click Verify.
When prompted to authenticate for sudo mode, type your password, then click Confirm.