GitHub Enterprise
Hideez Enterprise Server - Configuration SAML 2.0 for GitHub Enterprise
How to Configure SAML 2.0 for GitHub Enterprise
SAML single sign-on (SSO) gives organization owners and enterprise owners using GitHub Enterprise Cloud a way to control and secure access to organization resources like repositories, issues, and pull requests. Organization owners can invite your personal account on GitHub to join their organization that uses SAML SSO, which allows you to contribute to the organization and retain your existing identity and contributions on GitHub. If you're a member of an enterprise with managed users, you will instead use a new account that is provisioned for you and controlled by your enterprise.
Prerequisites
Access to the GitHub Enterprise admin account.
Administrative access to Hideez Enterprise Server to configure the IdP.
A configured Hideez Enterprise Server instance with user identities set up.
The users exist in Hideez Enterprise Server.
The user is added to the GitHub organization.
Step 0: Add users to the Hideez Enterprise Server
You have to add the users that belong to GitHub Enterprise to the tenant on Hideez Enterprise Server.
Step 1: Enable SAML Single Sign-On in GitHub Enterprise
Log in to your GitHub Enterprise account as an admin.
Navigate to the organization or enterprise settings:
For organizations: Go to
Settings → Security
.For enterprise accounts: Go to
Enterprise settings → Authentication
.
In the "SAML single sign-on" section, click
Enable SAML authentication
.
Step 2: Configure the SAML Settings in Hideez Enterprise Server
General Application Setup
Log in to your Hideez Enterprise Server as administrator.
Go to
Settings→ Parameters→ SAML→Add service provider
and create a new SAML application for GitHub Enterprise.
Provide the following details during the setup:
Name: Familiar name (e.g., SAML single sign-on for GitHub).
Issuer / SP Entity ID:
https://github.com/enterprises/<organization-name>/
(replace<organization-name>
with your organization's name). Example:https://github.com/enterprises/hideez
.ACS URL (Assertion Consumer Service URL):
https://github.com/orgs/<organization-name>/saml/consume
. Example:https://github.com/enterprises/hideez/saml/consume
.
Locate the assertion consumer service URL directly on your GitHub Enterprise account.
Click
Add
.
Go to the section
Identity Provider configuration
and download the Hideez Enterprise Server signing certificate (in X.509 format).
Keep this section open for later use.
Step 3: Complete SAML Setup in GitHub Enterprise
Return to the GitHub Enterprise SAML settings page.
Provide the following details:
Sign on URL: The SSO URL from Hideez Enterprise Server.
Issuer: The Entity ID or Issuer from Hideez Enterprise Server.
Public Certificate: Paste the X.509 certificate downloaded from Hideez Enterprise Server.
Open the Public Certificate downloaded from Hideez Enterprise Server on your computer, copy it, and paste it into GitHub.
Step 4: Test the SAML Configuration
On the GitHub Enterprise SAML settings page, click
Test SAML login
.Verify that you are redirected to Hideez Enterprise Server for authentication.
Complete the login process and confirm access to GitHub Enterprise.
Click
Test SAML configuration
before saving settings.Test SAML login to your GitHub Enterprise account using Hideez Enterprise Server.
Step 5: Save SAML for the GitHub Enterprises
After testing is successful, return to the SAML settings page.
Click
Save SAML settings
.
Save recovery codes for emergencies.
For further assistance, refer to GitHub Enterprise documentation and Hideez Identity Cloud support resources.
Last updated