You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update docs for ip allow list user level enforcement (#59695)
Co-authored-by: Paul Ndemo <ndemopaul1@gmail.com>
Co-authored-by: Sophie <29382425+sophietheking@users.noreply.github.com>
Co-authored-by: Joe Clark <31087804+jc-clark@users.noreply.github.com>
Copy file name to clipboardExpand all lines: content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-network-traffic-to-your-enterprise-with-an-ip-allow-list.md
+27Lines changed: 27 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -126,6 +126,33 @@ To ensure seamless use of the OIDC CAP while still applying the policy to OAuth
126
126
1. Optionally, to allow installed {% data variables.product.company_short %} and {% data variables.product.prodname_oauth_apps %} to access your enterprise from any IP address, select **Skip IdP check for applications**.
127
127
1. Click **Save**.
128
128
129
+
## Restricting access to user-owned resources with the IP allow list
130
+
131
+
> [!NOTE]
132
+
> User-level IP allow list enforcement is only available for enterprises that use {% data variables.product.prodname_emus %}.
133
+
134
+
By default, your enterprise's IP allow list does not restrict access to repositories and other resources owned by {% data variables.enterprise.prodname_managed_users %}. You can enable user-level enforcement to extend IP allow list restrictions to user-owned resources, including:
135
+
136
+
* User-owned repositories and their forks
137
+
* User profile pages
138
+
139
+
This ensures that all locations where enterprise code may reside—not just organization-owned repositories—are only accessible from allowed IP addresses.
140
+
141
+
### Enabling user-level enforcement
142
+
143
+
{% data reusables.enterprise-accounts.access-enterprise %}
144
+
{% data reusables.enterprise-accounts.settings-tab %}
145
+
{% data reusables.enterprise-accounts.security-tab %}
146
+
1. Under "IP allow list", select **Enable IP allow list user-level enforcement**.
147
+
1. Click **Save**.
148
+
149
+
> [!IMPORTANT]
150
+
> Before enabling user-level enforcement, add all IP addresses that your {% data variables.enterprise.prodname_managed_users %} use to connect to the enterprise IP allow list. If a user connects from an IP address that isn’t on the allow list, they won’t be able to access their user-owned resources.
151
+
152
+
### Disabling user-level enforcement
153
+
154
+
To stop enforcing the IP allow list on user-owned resources, follow the same steps above and deselect **Enable IP allow list user-level enforcement**, then click **Save**. Access to user-owned resources will no longer be restricted by the IP allow list.
155
+
129
156
## Using {% data variables.product.prodname_actions %} with an IP allow list
130
157
131
158
{% data reusables.actions.ip-allow-list-self-hosted-runners %}
Copy file name to clipboardExpand all lines: data/reusables/identity-and-permissions/ip-allow-lists-which-resources-are-protected.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,10 +12,10 @@ IP allow lists **do** restrict access to:
12
12
> [!NOTE]
13
13
> Excluding installation tokens used by a {% data variables.product.prodname_github_app %} which is installed on a user account.
14
14
* Raw URLs for files in repositories, such as `https://raw.githubusercontent.com/octo-org/octo-repo/main/README.md?token=ABC10001`
15
+
* Repositories, including forks, owned by {% data variables.enterprise.prodname_managed_users %}, when enabled
15
16
16
17
IP allow lists do **not** restrict access to:
17
18
18
-
* Repositories, including forks, owned by {% data variables.enterprise.prodname_managed_users %}
19
19
* Public resources, when accessed anonymously
20
20
* A {% data variables.product.prodname_github_app %} (server-to-server) installation token when the {% data variables.product.prodname_github_app %} is installed on a user account.
21
21
* {% data variables.product.prodname_copilot %} features that do not require directly fetching private or organizational data from {% data variables.product.prodname_dotcom %}
0 commit comments