Skip to content

Commit 0479acc

Browse files
authored
Merge pull request #12020 from github/repo-sync
repo sync
2 parents a7e51b0 + 7164ca8 commit 0479acc

7 files changed

Lines changed: 44 additions & 5 deletions

File tree

content/admin/configuration/configuring-network-settings/configuring-tls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,12 +45,12 @@ You can generate a certificate signing request (CSR) for your instance using the
4545
![Radio buttons with options to choose TLS protocols](/assets/images/enterprise/management-console/tls-protocol-support.png)
4646
5. Under "Certificate", click **Choose File** to choose a TLS certificate or certificate chain (in PEM format) to install. This file will usually have a *.pem*, *.crt*, or *.cer* extension.
4747
![Button to find TLS certificate file](/assets/images/enterprise/management-console/install-tls-certificate.png)
48-
6. Under "Unencrypted key", click **Choose File** to choose a TLS key (in PEM format) to install. This file will usually have a *.key* extension.
48+
6. Under "Unencrypted key", click **Choose File** to choose an RSA key (in PEM format) to install. This file will usually have a *.key* extension.
4949
![Button to find TLS key file](/assets/images/enterprise/management-console/install-tls-key.png)
5050

5151
{% warning %}
5252

53-
**Warning**: Your TLS key must not have a passphrase. For more information, see "[Removing the passphrase from your key file](/enterprise/{{ currentVersion }}/admin/guides/installation/troubleshooting-ssl-errors#removing-the-passphrase-from-your-key-file)".
53+
**Warning**: Your key must be an RSA key and must not have a passphrase. For more information, see "[Removing the passphrase from your key file](/admin/guides/installation/troubleshooting-ssl-errors#removing-the-passphrase-from-your-key-file)".
5454

5555
{% endwarning %}
5656
{% data reusables.enterprise_management_console.save-settings %}

content/admin/user-management/monitoring-activity-in-your-enterprise/log-forwarding.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,17 +17,22 @@ topics:
1717
- Logging
1818
- Security
1919
---
20+
21+
## About log forwarding
22+
2023
Any log collection system that supports syslog-style log streams is supported (e.g., [Logstash](http://logstash.net/) and [Splunk](http://docs.splunk.com/Documentation/Splunk/latest/Data/Monitornetworkports)).
2124

25+
When you enable log forwarding, you must upload a CA certificate to encrypt communications between syslog endpoints. Your appliance and the remote syslog server will perform two-way SSL, each providing a certificate to the other and validating the certificate which is received.
26+
2227
## Enabling log forwarding
2328

2429
{% ifversion ghes %}
2530
1. On the {% data variables.enterprise.management_console %} settings page, in the left sidebar, click **Monitoring**.
2631
1. Select **Enable log forwarding**.
2732
1. In the **Server address** field, type the address of the server to which you want to forward logs. You can specify multiple addresses in a comma-separated list.
2833
1. In the Protocol drop-down menu, select the protocol to use to communicate with the log server. The protocol will apply to all specified log destinations.
29-
1. Select **Enable TLS**.
30-
1. Click **Choose File** and choose a CA certificate to encrypt communication between syslog endpoints. The entire certificate chain will be validated, and must terminate in a root certificate. For more information, see [TLS options in the syslog-ng documentation](https://support.oneidentity.com/technical-documents/syslog-ng-open-source-edition/3.16/administration-guide/56#TOPIC-956599).
34+
1. Optionally, select **Enable TLS**. We recommend enabling TLS according to your local security policies, especially if there are untrusted networks between the appliance and any remote log servers.
35+
1. To encrypt communication between syslog endpoints, click **Choose File** and choose a CA certificate for the remote syslog server. You should upload a CA bundle containing a concatenation of the certificates of the CAs involved in signing the certificate of the remote log server. The entire certificate chain will be validated, and must terminate in a root certificate. For more information, see [TLS options in the syslog-ng documentation](https://support.oneidentity.com/technical-documents/syslog-ng-open-source-edition/3.16/administration-guide/56#TOPIC-956599).
3136
{% elsif ghae %}
3237
{% data reusables.enterprise-accounts.access-enterprise %}
3338
{% data reusables.enterprise-accounts.settings-tab %}

content/authentication/authenticating-with-saml-single-sign-on/authorizing-a-personal-access-token-for-use-with-saml-single-sign-on.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ shortTitle: PAT with SAML
1515
---
1616
You can authorize an existing personal access token, or [create a new personal access token](/github/authenticating-to-github/creating-a-personal-access-token) and then authorize it.
1717

18+
{% data reusables.saml.authorized-creds-info %}
19+
1820
{% data reusables.user_settings.access_settings %}
1921
{% data reusables.user_settings.developer_settings %}
2022
{% data reusables.user_settings.personal_access_tokens %}

content/authentication/authenticating-with-saml-single-sign-on/authorizing-an-ssh-key-for-use-with-saml-single-sign-on.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ shortTitle: SSH Key with SAML
1515
---
1616
You can authorize an existing SSH key, or create a new SSH key and then authorize it. For more information about creating a new SSH key, see "[Generating a new SSH key and adding it to the ssh-agent](/articles/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent)."
1717

18+
{% data reusables.saml.authorized-creds-info %}
19+
1820
{% note %}
1921

2022
**Note:** If your SSH key authorization is revoked by an organization, you will not be able to reauthorize the same key. You will need to create a new SSH key and authorize it. For more information about creating a new SSH key, see "[Generating a new SSH key and adding it to the ssh-agent](/articles/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent)."

content/organizations/managing-saml-single-sign-on-for-your-organization/managing-team-synchronization-for-your-organization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The steps to enable team synchronization depend on the IdP you want to use. Ther
4848

4949
You must enable SAML single sign-on for your organization and your supported IdP. For more information, see "[Enforcing SAML single sign-on for your organization](/articles/enforcing-saml-single-sign-on-for-your-organization)."
5050

51-
You must authenticate to your organization using SAML SSO and the supported IdP. For more information, see "[Authenticating with SAML single sign-on](/articles/authenticating-with-saml-single-sign-on)."
51+
You must have a linked SAML identity. To create a linked identity, you must authenticate to your organization using SAML SSO and the supported IdP at least once. For more information, see "[Authenticating with SAML single sign-on](/articles/authenticating-with-saml-single-sign-on)."
5252

5353
### Enabling team synchronization for Azure AD
5454

content/sponsors/receiving-sponsorships-through-github-sponsors/viewing-your-sponsors-and-sponsorships.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,30 @@ shortTitle: View sponsors & sponsorships
1818

1919
You can view analytics on your current and past sponsorships, the payments you've received from sponsors, and events, such as cancellations and sponsor tier changes for your sponsorships. You can also view activity such as new sponsorships, changes to sponsorships, and canceled sponsorships. You can filter the list of activities by date. You can also export sponsorship data for the account you're viewing in CSV or JSON format.
2020

21+
## About transaction metadata
22+
23+
To track where your sponsorships are coming from, you can use custom URLs with metadata for your {% data variables.product.prodname_sponsors %} profile or checkout page. The metadata will be included in your transaction export in the metadata column. For more information about exporting transaction data, see "[Exporting your sponsorship data](#exporting-your-sponsorship-data)."
24+
25+
Metadata must use the `key=value` format and can be added to the end of these URLs.
26+
27+
- Sponsored account profile: `https://github.com/sponsors/{account}`
28+
- Sponsorship checkout: `https://github.com/sponsors/{account}/sponsorships`
29+
30+
The metadata will persist in the URL as a potential sponsor switches accounts to sponsor with, selects monthly or one-time payments, and chooses a different tier.
31+
32+
### Syntax requirements
33+
34+
Your metadata must meet the following requirements, which do not apply to any other URL parameters that are passed.
35+
36+
- Keys must be prefixed by `metadata_`, such as `metadata_campaign`. In your transaction export, the `metadata_` prefix will be removed from the key.
37+
- Keys and values must only contain alphanumeric values, dashes, or underscores. If non-accepted characters are passed in either keys or values, a 404 error will be presented.
38+
- Whitespaces are not allowed.
39+
- A maximum of **10** key-value pairs are accepted per request. If more are passed, only the first 10 will be saved.
40+
- A maximum of **25** characters per key are accepted. If more than that are passed, only the first 25 will be saved.
41+
- A maximum of **100** characters per value are accepted. If more than that are passed, only the first 100 will be saved.
42+
43+
For example, you can use `https://github.com/sponsors/{account}?metadata_campaign=myblog` to track sponsorships that originate from your blog. `metadata_campaign` is the key and `myblog` is the value. In the metadata column of your transaction export, the key will be listed as `campaign`.
44+
2145
## Viewing your sponsors and sponsorships
2246

2347
{% data reusables.sponsors.navigate-to-sponsors-dashboard %}
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
Before you can authorize a personal access token or SSH key, you must have a linked SAML identity. If you're a member of an organization where SAML SSO is enabled, you can create a linked identity by authenticating to your organization with your IdP at least once. For more information, see "[About authentication with SAML single sign-on](/authentication/authenticating-with-saml-single-sign-on/about-authentication-with-saml-single-sign-on)."
2+
3+
After you authorize a personal access token or SSH key, the authorization does not expire. The token or key will stay authorized until revoked in one of these ways.
4+
- An organization owner revokes the authorization.
5+
- You are removed from the organization.
6+
- The scopes in a personal access token are edited, or the token is regenerated.

0 commit comments

Comments
 (0)