Skip to content

Commit 7961f4b

Browse files
committed
Updates
1 parent 072435f commit 7961f4b

File tree

3 files changed

+42
-35
lines changed

3 files changed

+42
-35
lines changed

learn-pr/github/authenticate-authorize-user-identities-github/includes/5-team-synchronization.md

Lines changed: 17 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -11,26 +11,31 @@ Managing a team via your service provider allows you to save time and resources
1111
| Custom team/group maps | The team `slug` and group name will be matched automatically, unless you define a custom mapping with `syncmap.yml` |
1212
| Dynamic Config | Utilize a `settings` file to derive Active Directory and GitHub settings |
1313

14-
## Enterprise Managed Users
14+
## Enterprise Managed Users and GitHub Enterprise Server
1515

16-
Team synchronization is also available for organizations and enterprise accounts that use GitHub Enterprise Cloud. Enterprise Managed Users is a feature of GitHub Enterprise Cloud that provides even greater control over enterprise members and resources.
16+
Team synchronization is also available for organizations and enterprise accounts that use GitHub Enterprise Cloud or [GitHub Enterprise Server (GHE.com)](https://github.com/enterprise), which is the preferred solution in regions where it is available or required for compliance reasons.
1717

18-
## Enterprise Managed Users
19-
20-
Enterprise Managed Users (EMUs) are a GitHub Enterprise Cloud feature that gives enterprises complete control over user identity and account lifecycle. With EMUs, GitHub accounts are **fully managed by the enterprise’s identity provider (IdP)**. This means users do not sign up for GitHub manually — all user provisioning, access, and offboarding is automated through tools like Microsoft Entra ID or Okta.
18+
**Enterprise Managed Users (EMUs)** are a GitHub Enterprise Cloud feature that gives enterprises complete control over user identity and account lifecycle. With EMUs, GitHub accounts are fully managed by the enterprise’s identity provider (IdP). This means users do not sign up for GitHub manually—all user provisioning, access, and offboarding is automated through tools like Microsoft Entra ID or Okta.
2119

2220
EMUs are ideal for organizations with strict compliance, audit, or user governance needs. They help ensure that:
23-
- All accounts are owned by the enterprise
24-
- Access is automatically granted or removed based on IdP membership
25-
- No external collaboration happens unintentionally
21+
22+
* All accounts are owned by the enterprise
23+
* Access is automatically granted or removed based on IdP membership
24+
* No external collaboration happens unintentionally
2625

2726
When using EMUs:
28-
- Managed users cannot push code to or fork repositories outside the enterprise
29-
- They can only interact with other users and resources inside the enterprise
3027

31-
You can manage EMU-based organization and team membership using groups in your IdP, and optionally integrate [team synchronization](#enable-team-synchronization) to automate group-to-team mapping.
28+
* Managed users cannot push code to or fork repositories outside the enterprise
29+
* They can only interact with other users and resources inside the enterprise
30+
31+
You can manage EMU-based organization and team membership using groups in your IdP, and optionally integrate [team synchronization](#enable-team-synchronization) to automate group-to-team mapping.
32+
33+
For organizations with requirements around self-hosting or specific regional regulations, **GitHub Enterprise Server (GHE.com)** offers an on-premises solution that allows you to maintain full control of your GitHub environment.
34+
35+
For more details, see [Getting started with GitHub Enterprise Cloud](https://docs.github.com/get-started/onboarding/getting-started-with-github-enterprise-cloud) and [About GitHub Enterprise Server](https://docs.github.com/en/enterprise-server@latest/get-started/learning-about-github/about-github-enterprise-server).
36+
3237

33-
For more details, see [Getting started with GitHub Enterprise Cloud](https://docs.github.com/get-started/onboarding/getting-started-with-github-enterprise-cloud).
38+
Randy
3439

3540
## Usage limits
3641

learn-pr/github/github-introduction-administration/includes/3-how-github-authentication-works.md

Lines changed: 22 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -26,41 +26,50 @@ You can even use SSH keys with a repository owned by an organization that uses S
2626

2727
Deploy keys are another type of SSH key in GitHub that grants a user access to a single repository. GitHub attaches the public part of the key directly to the repository instead of a personal user account, and the private part of the key remains on the user's server. Deploy keys are read-only by default, but you can give them write access when adding them to a repository.
2828

29+
30+
31+
Randy
32+
2933
## GitHub's added security options
3034

31-
GitHub also offers the following extra security options.
35+
GitHub provides a range of security options to help protect accounts and organizational resources.
3236

3337
### Two-factor authentication
3438

3539
:::image type="content" source="../media/2-factor-authentication.png" alt-text="Screenshot of the two-factor authentication screen.":::
3640

37-
Two-factor authentication (2FA), sometimes known as multifactor authentication (MFA), is an extra layer of security used when logging into websites or apps. With 2FA, users have to sign in with their username and password and provide another form of authentication that only they have access to.
41+
Two-factor authentication (2FA), sometimes known as multifactor authentication (MFA), adds an extra layer of protection to your GitHub account. With 2FA, users sign in with their username and password, and then provide a second form of authentication.
3842

39-
For GitHub, the second form of authentication is a code generated by an application on a user's mobile device or sent as a text message (SMS). After a user enables 2FA, GitHub generates an authentication code anytime someone attempts to sign into their GitHub account. Users can only sign into their account if they know their password and have access to the authentication code on their phone.
43+
GitHub supports several second-factor options:
44+
- Authenticator apps (like Microsoft Authenticator, Google Authenticator, or Authy) that generate time-based one-time codes.
45+
- Hardware security keys (such as YubiKey or Titan Security Key) that support FIDO2/WebAuthn.
46+
- Passkeys for passwordless, phishing-resistant authentication.
47+
- SMS-based codes, which are supported but considered less secure than other options and are not recommended as a primary method.
4048

41-
Organization owners can require organization members, outside collaborators, and billing managers to enable 2FA for their personal accounts. This action makes it harder for malicious actors to access an organization's repositories and settings.
49+
**2FA enforcement:**
4250

43-
Enterprise owners can also enforce certain security policies for all organizations owned by an enterprise account.
51+
- For organizations on GitHub Team and GitHub Enterprise Cloud, organization owners can require members, outside collaborators, and billing managers to enable 2FA for their personal accounts.
52+
- Enterprise Managed Users (EMUs) and GitHub Enterprise Server (GHE.com): Admins can require 2FA for enterprise-managed accounts only, but cannot enforce 2FA on users’ personal GitHub.com accounts.
4453

45-
### SAML SSO
54+
Enforcing 2FA helps protect organizations from unauthorized access and strengthens the security of repositories and sensitive data.
4655

47-
If you centrally manage your users' identities and applications with an IdP, you can configure SAML SSO to protect your organization's resources on GitHub.
48-
49-
This type of authentication gives organization and enterprise owners on GitHub a way to control and secure access to organization resources like repositories, issues, and pull requests. Organization owners can invite GitHub users to join the organization that uses SAML SSO, which allows those users to contribute to the organization and retain their existing identity and contributions on GitHub.
56+
### SAML SSO
5057

51-
When users access resources within an organization that uses SAML SSO, GitHub will redirect them to the organization's SAML IdP for authentication. After they successfully authenticate with their account on the IdP, the IdP redirects to GitHub to access the organization's resources.
58+
If you centrally manage your users' identities with an identity provider (IdP), you can configure SAML single sign-on (SSO) to protect your organization’s resources on GitHub. SAML SSO allows organization and enterprise owners to control and secure access to repositories, issues, pull requests, and more. When accessing resources, GitHub redirects users to authenticate with the organization’s IdP.
5259

53-
GitHub offers limited support for all identity providers that implement the SAML 2.0 standard with official support for several popular identity providers including:
60+
GitHub supports all identity providers that implement the SAML 2.0 standard, with official support for several popular providers, including:
5461

5562
- Active Directory Federation Services (AD FS).
5663
- Microsoft Entra ID.
5764
- Okta.
5865
- OneLogin.
5966
- PingOne.
6067

61-
### LDAP
68+
### LDAP (GitHub Enterprise Server)
69+
70+
LDAP (Lightweight Directory Access Protocol) is a widely used protocol for accessing and managing user directory information. On GitHub Enterprise Server, LDAP integration allows you to authenticate users against your existing company directory and manage repository access centrally.
6271

63-
Lightweight directory access protocol (LDAP) is a popular application protocol for accessing and maintaining directory information services. LDAP lets you authenticate GitHub Enterprise Server against your existing accounts and centrally manage repository access. It's one of the most common protocols used to integrate third-party software with large company user directories.
72+
GitHub Enterprise Server integrates with major LDAP services such as:
6473

6574
GitHub Enterprise Server integrates with popular LDAP services like:
6675

learn-pr/github/github-introduction-administration/includes/4-how-github-organization-permission-works.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,24 +7,17 @@ In the previous unit, you explored the different ways that users can authenticat
77

88
## Repository permission levels
99

10-
You can customize access to a given repository by assigning permissions. There are five repository-level permissions:
10+
You can customize access to each repository by assigning specific permission levels. There are five standard repository-level permissions:
1111

1212
- **Read**: Recommended for non-code contributors who want to view or discuss your project. This level is good for anyone that needs to view the content within the repository but doesn't need to actually make contributions or changes.
1313
- **Triage**: Recommended for contributors who need to proactively manage issues and pull requests without write access. This level could be good for some project managers who manage tracking issues but don't make any changes.
1414
- **Write**: Recommended for contributors who actively push to your project. Write is the standard permission for most developers.
1515
- **Maintain**: Recommended for project managers who need to manage the repository without access to sensitive or destructive actions.
1616
- **Admin**: Recommended for people who need full access to the project, including sensitive and destructive actions like managing security or deleting a repository. These people are repository owners and administrators.
1717

18-
You can give organization members, outside collaborators, and teams different levels of access to repositories owned by an organization. Each permission level progressively increases access to a repository's content and settings. Choose the level that best fits each person or team's role in your project without giving more access to the project than necessary.
18+
You can assign different permission levels to organization members, outside collaborators, and teams for repositories owned by your organization. Each permission level increases access to the repositorys content and settings. Always choose the minimum level of access required for each person or team’s responsibilities.
1919

20-
After you create a repository with the correct permissions, you can make it a template so that anyone who has access to the repository can generate a new repository that has the same directory structure and files as your default branch. To make a template:
21-
22-
1. On GitHub.com, go to the main page of the repository.
23-
1. Under the repository name, select **Settings**. If you can't see the **Settings** tab, open the dropdown menu, and then select **Settings**.
24-
25-
:::image type="content" source="../media/repository-actions-settings.png" alt-text="Screenshot showing where to locate the settings button in your GitHub repository.":::
26-
27-
1. Select **Template repository**.
20+
Administrators can also create custom roles in GitHub Enterprise, extending one of these base roles with additional permissions as needed.
2821

2922
### What is repository forking?
3023

0 commit comments

Comments
 (0)