Skip to content

Commit d4691af

Browse files
DamienButlermchammer01Copilot
authored
Damienbutler GHES SCIM table network requirements for configuring SCIM provisioning (#57991)
Co-authored-by: mc <[email protected]> Co-authored-by: Copilot <[email protected]>
1 parent 1d8f219 commit d4691af

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

content/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,14 @@ If you're configuring SCIM provisioning for a new enterprise, make sure to compl
5858
{% else %}
5959

6060
* SCIM is a server-to-server protocol. Your instance's REST API endpoints must be accessible to your SCIM provider.
61+
62+
This table contains the network requirements to configure GHES SCIM with an IdP:
63+
64+
| System | Direction | Purpose | Protocol / Port | Notes |
65+
|------------|------------|----------|------------------|-------|
66+
| GitHub Enterprise Server | Inbound | Receives SCIM API requests from IdP for users and groups | TCP 443 (HTTPS) | [AUTOTITLE](/enterprise-server/rest/enterprise-admin/scim) must be reachable from IdP |
67+
| Identity Provider (IdP) | Outbound | Sends SCIM provisioning requests to GitHub for users and groups | TCP 443 (HTTPS) | IdP acts as SCIM client, initiating outbound HTTPS connections to GitHub's SCIM API endpoints. |
68+
6169
* For authentication, your instance must use SAML SSO, or a mix of SAML and built-in authentication.
6270
* You cannot mix SCIM with other external authentication methods. If you use CAS or LDAP, you will need to migrate to SAML before using SCIM.
6371
* After you have configured SCIM, you must keep SAML authentication enabled to continue using SCIM.

0 commit comments

Comments
 (0)