Configuring SAML for GitHub.com


This article is an add-on to our SAML configuration guide, supplementing the process described there with specific details and additional information unique to configuring SAML for the GitHub Enterprise Cloud app connector in OneLogin's app catalog.

Note: SAML SSO on GitHub.com does not automatically log users into their personal accounts. It primarily serves to grant and maintain access to those SAML-protected organizations that they're a member of. This means that users will be prompted for their GitHub password during the authentication process even though SAML is enabled.

Prerequisites

 


 

Configuration

Organization

Enter your organization name in GitHub. This is typically the part of your GitHub URL immediately following the top-level domain, e.g. https://github.com/example/.

Scim Base URL

This is used only during provisioning setup and may be disregarded if you're not configuring user provisioning for GitHub.

Session Length

Enter the maximum length of a user's login session in minutes; the user will be automatically logged out of GitHub after this time has elapsed. The default session length is 1440 minutes, or one day.

Configuration

 


 

SSO

  1. Copy your OneLogin SSO values to their corresponding fields in GitHub:

    OneLogin

    GitHub

    Issuer URL

    Issuer

    SAML 2.0 Endpoint (HTTP)

    Sign on URL

    X.509 Certificate

    Public certificate

  2. In GitHub, click the pencil icon (Edit) to the right of the phrase "Your SAML provider is using..." and select the same SAML Signature Algorithm you've chosen in OneLogin.

    GitHub - Edit Signature

  3. Click Test SAML configuration in GitHub to verify your account details.