Skip to content

Commit c2b6f1b

Browse files
erikaxupndemosophiethekingjc-clark
authored
Update docs for ip allow list user level enforcement (#59695)
Co-authored-by: Paul Ndemo <ndemopaul1@gmail.com> Co-authored-by: Sophie <29382425+sophietheking@users.noreply.github.com> Co-authored-by: Joe Clark <31087804+jc-clark@users.noreply.github.com>
1 parent b1ecaf6 commit c2b6f1b

2 files changed

Lines changed: 28 additions & 1 deletion

File tree

content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-network-traffic-to-your-enterprise-with-an-ip-allow-list.md

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,33 @@ To ensure seamless use of the OIDC CAP while still applying the policy to OAuth
126126
1. Optionally, to allow installed {% data variables.product.company_short %} and {% data variables.product.prodname_oauth_apps %} to access your enterprise from any IP address, select **Skip IdP check for applications**.
127127
1. Click **Save**.
128128

129+
## Restricting access to user-owned resources with the IP allow list
130+
131+
> [!NOTE]
132+
> User-level IP allow list enforcement is only available for enterprises that use {% data variables.product.prodname_emus %}.
133+
134+
By default, your enterprise's IP allow list does not restrict access to repositories and other resources owned by {% data variables.enterprise.prodname_managed_users %}. You can enable user-level enforcement to extend IP allow list restrictions to user-owned resources, including:
135+
136+
* User-owned repositories and their forks
137+
* User profile pages
138+
139+
This ensures that all locations where enterprise code may reside—not just organization-owned repositories—are only accessible from allowed IP addresses.
140+
141+
### Enabling user-level enforcement
142+
143+
{% data reusables.enterprise-accounts.access-enterprise %}
144+
{% data reusables.enterprise-accounts.settings-tab %}
145+
{% data reusables.enterprise-accounts.security-tab %}
146+
1. Under "IP allow list", select **Enable IP allow list user-level enforcement**.
147+
1. Click **Save**.
148+
149+
> [!IMPORTANT]
150+
> Before enabling user-level enforcement, add all IP addresses that your {% data variables.enterprise.prodname_managed_users %} use to connect to the enterprise IP allow list. If a user connects from an IP address that isn’t on the allow list, they won’t be able to access their user-owned resources.
151+
152+
### Disabling user-level enforcement
153+
154+
To stop enforcing the IP allow list on user-owned resources, follow the same steps above and deselect **Enable IP allow list user-level enforcement**, then click **Save**. Access to user-owned resources will no longer be restricted by the IP allow list.
155+
129156
## Using {% data variables.product.prodname_actions %} with an IP allow list
130157

131158
{% data reusables.actions.ip-allow-list-self-hosted-runners %}

data/reusables/identity-and-permissions/ip-allow-lists-which-resources-are-protected.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ IP allow lists **do** restrict access to:
1212
> [!NOTE]
1313
> Excluding installation tokens used by a {% data variables.product.prodname_github_app %} which is installed on a user account.
1414
* Raw URLs for files in repositories, such as `https://raw.githubusercontent.com/octo-org/octo-repo/main/README.md?token=ABC10001`
15+
* Repositories, including forks, owned by {% data variables.enterprise.prodname_managed_users %}, when enabled
1516

1617
IP allow lists do **not** restrict access to:
1718

18-
* Repositories, including forks, owned by {% data variables.enterprise.prodname_managed_users %}
1919
* Public resources, when accessed anonymously
2020
* A {% data variables.product.prodname_github_app %} (server-to-server) installation token when the {% data variables.product.prodname_github_app %} is installed on a user account.
2121
* {% data variables.product.prodname_copilot %} features that do not require directly fetching private or organizational data from {% data variables.product.prodname_dotcom %}

0 commit comments

Comments
 (0)