From 371eec0413aa1271c24ac6af573674bd0553f83c Mon Sep 17 00:00:00 2001 From: Laura Coursen Date: Tue, 19 Sep 2023 15:08:26 -0500 Subject: [PATCH] Ping Federate Connector for EMUs GA (#40914) Co-authored-by: Matt Pollard --- .../about-enterprise-managed-users.md | 4 ++-- ...ring-saml-single-sign-on-for-enterprise-managed-users.md | 6 ++---- ...guring-scim-provisioning-for-enterprise-managed-users.md | 4 +--- data/reusables/enterprise-accounts/beta-pingfed-for-emu.md | 5 ----- data/reusables/enterprise-accounts/emu-supported-idps.md | 2 +- .../enterprise-accounts/public-beta-pingfed-for-emu.md | 5 ----- 6 files changed, 6 insertions(+), 20 deletions(-) delete mode 100644 data/reusables/enterprise-accounts/beta-pingfed-for-emu.md delete mode 100644 data/reusables/enterprise-accounts/public-beta-pingfed-for-emu.md diff --git a/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-enterprise-managed-users.md b/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-enterprise-managed-users.md index 48960c06ee..ca09a86e4e 100644 --- a/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-enterprise-managed-users.md +++ b/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-enterprise-managed-users.md @@ -64,7 +64,7 @@ To discover how a member was added to an organization, you can filter the member |-------------------|------|------| | Azure Active Directory | {% octicon "check" aria-label="Supported" %} | {% octicon "check" aria-label="Supported" %} | | Okta | {% octicon "check" aria-label="Supported" %} | {% octicon "x" aria-label="Not supported" %} | -| PingFederate (public beta) | {% octicon "check" aria-label="Supported" %} | {% octicon "x" aria-label="Not supported" %} | +| PingFederate | {% octicon "check" aria-label="Supported" %} | {% octicon "x" aria-label="Not supported" %} | {% else %} @@ -129,7 +129,7 @@ Before your developers can use {% data variables.product.prodname_ghe_cloud %} w 1. After you log in as the setup user, we recommend enabling two-factor authentication. The setup user's password and two-factor credentials can also be used to enter sudo mode, which is required to take sensitive actions. For more information, see "[AUTOTITLE](/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication)" and "[AUTOTITLE](/authentication/keeping-your-account-and-data-secure/sudo-mode)." -1. To get started, configure {% ifversion oidc-for-emu %}how your members will authenticate. If you are using Azure Active Directory as your identity provider, you can choose between OpenID Connect (OIDC) and Security Assertion Markup Language (SAML). We recommend OIDC, which includes support for Conditional Access Policies (CAP). If you require multiple enterprises with {% data variables.enterprise.prodname_managed_users %} provisioned from one tenant, you must use SAML for each enterprise after the first. If you are using another identity provider, like Okta or PingFederate (public beta), you can use SAML to authenticate your members.{% else %}SAML SSO for your enterprise. For more information, see "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users)."{% endif %} +1. To get started, configure {% ifversion oidc-for-emu %}how your members will authenticate. If you are using Azure Active Directory as your identity provider, you can choose between OpenID Connect (OIDC) and Security Assertion Markup Language (SAML). We recommend OIDC, which includes support for Conditional Access Policies (CAP). If you require multiple enterprises with {% data variables.enterprise.prodname_managed_users %} provisioned from one tenant, you must use SAML for each enterprise after the first. If you are using another identity provider, like Okta or PingFederate, you can use SAML to authenticate your members.{% else %}SAML SSO for your enterprise. For more information, see "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users)."{% endif %} {%- ifversion oidc-for-emu %} diff --git a/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users.md b/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users.md index 1e4a15750d..1614c46f70 100644 --- a/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users.md +++ b/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users.md @@ -59,17 +59,15 @@ To configure your IdP, follow the instructions they provide for configuring the - [{% data variables.product.prodname_emu_idp_application %} application on Azure Active Directory](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/aad.githubenterprisemanageduser?tab=Overview) - [{% data variables.product.prodname_emu_idp_application %} application on Okta](https://www.okta.com/integrations/github-enterprise-managed-user) - - [{% data variables.product.prodname_emu_idp_application %} connector on PingFederate](https://www.pingidentity.com/en/resources/downloads/pingfederate.html) (public beta) + - [{% data variables.product.prodname_emu_idp_application %} connector on PingFederate](https://www.pingidentity.com/en/resources/downloads/pingfederate.html) To download the PingFederate connector, navigate to the **Add-ons** tab and select **GitHub EMU Connector 1.0**. - {% data reusables.enterprise-accounts.public-beta-pingfed-for-emu %} - 1. To configure the {% data variables.product.prodname_emu_idp_application %} application and your IdP, click the link below and follow the instructions provided by your IdP: - [Azure Active Directory tutorial for {% data variables.product.prodname_emus %}](https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/github-enterprise-managed-user-tutorial) - [Okta documentation for {% data variables.product.prodname_emus %}](https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-GitHub-Enterprise-Managed-User.html) - - [PingFederate documentation for {% data variables.product.prodname_emus %}](https://docs.pingidentity.com/r/en-us/pingfederate-github-emu-connector/pingfederate_github_emu_connector) (public beta) + - [PingFederate documentation for {% data variables.product.prodname_emus %}](https://docs.pingidentity.com/r/en-us/pingfederate-github-emu-connector/pingfederate_github_emu_connector) 1. So you can test and configure your enterprise, assign yourself or the user that will be configuring SAML SSO on {% data variables.product.prodname_dotcom %} to the {% data variables.product.prodname_emu_idp_application %} application on your IdP. diff --git a/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-scim-provisioning-for-enterprise-managed-users.md b/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-scim-provisioning-for-enterprise-managed-users.md index 36548de205..ff30649631 100644 --- a/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-scim-provisioning-for-enterprise-managed-users.md +++ b/content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-scim-provisioning-for-enterprise-managed-users.md @@ -70,9 +70,7 @@ To configure provisioning, follow the appropriate link from the table below. | Azure AD | OIDC | [Tutorial: Configure GitHub Enterprise Managed User (OIDC) for automatic user provisioning](https://docs.microsoft.com/azure/active-directory/saas-apps/github-enterprise-managed-user-oidc-provisioning-tutorial) in the Azure AD documentation |{% endif %} | Azure AD | SAML | [Tutorial: Configure GitHub Enterprise Managed User for automatic user provisioning](https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/github-enterprise-managed-user-provisioning-tutorial) in the Azure AD documentation | | Okta | SAML | [Configuring SCIM provisioning for Enterprise Managed Users with Okta](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-scim-provisioning-for-enterprise-managed-users-with-okta) | -| PingFederate (public beta) | SAML | [Configure PingFederate for provisioning and SSO](https://docs.pingidentity.com/r/en-us/pingfederate-github-emu-connector/pingfederate_github_connector_configure_pingfederate_for_provisioning_and_sso) and [Managing channels](https://docs.pingidentity.com/r/en-us/pingfederate-112/help_saasmanagementtasklet_saasmanagementstate) in the PingFederate documentation | - -{% data reusables.enterprise-accounts.public-beta-pingfed-for-emu %} +| PingFederate | SAML | [Configure PingFederate for provisioning and SSO](https://docs.pingidentity.com/r/en-us/pingfederate-github-emu-connector/pingfederate_github_connector_configure_pingfederate_for_provisioning_and_sso) and [Managing channels](https://docs.pingidentity.com/r/en-us/pingfederate-112/help_saasmanagementtasklet_saasmanagementstate) in the PingFederate documentation | {% note %} diff --git a/data/reusables/enterprise-accounts/beta-pingfed-for-emu.md b/data/reusables/enterprise-accounts/beta-pingfed-for-emu.md deleted file mode 100644 index 47bf294617..0000000000 --- a/data/reusables/enterprise-accounts/beta-pingfed-for-emu.md +++ /dev/null @@ -1,5 +0,0 @@ -{% note %} - -**Note:** Support for PingFederate is currently in private beta and subject to change. To request access to the beta, contact {% data variables.contact.contact_enterprise_sales %}. - -{% endnote %} diff --git a/data/reusables/enterprise-accounts/emu-supported-idps.md b/data/reusables/enterprise-accounts/emu-supported-idps.md index a638208084..b3cfb742c2 100644 --- a/data/reusables/enterprise-accounts/emu-supported-idps.md +++ b/data/reusables/enterprise-accounts/emu-supported-idps.md @@ -1,3 +1,3 @@ - Azure Active Directory (Azure AD) - Okta -- PingFederate (public beta) +- PingFederate diff --git a/data/reusables/enterprise-accounts/public-beta-pingfed-for-emu.md b/data/reusables/enterprise-accounts/public-beta-pingfed-for-emu.md deleted file mode 100644 index ff236413f5..0000000000 --- a/data/reusables/enterprise-accounts/public-beta-pingfed-for-emu.md +++ /dev/null @@ -1,5 +0,0 @@ -{% note %} - -**Note:** Support for PingFederate is currently in public beta and subject to change. - -{% endnote %}