Skip to content

Commit d4691af

Browse files
DamienButlermchammer01Copilot
authored
Damienbutler GHES SCIM table network requirements for configuring SCIM provisioning (#57991)
Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
1 parent 1d8f219 commit d4691af

1 file changed

Lines changed: 8 additions & 0 deletions

File tree

content/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,14 @@ If you're configuring SCIM provisioning for a new enterprise, make sure to compl
5858
{% else %}
5959

6060
* SCIM is a server-to-server protocol. Your instance's REST API endpoints must be accessible to your SCIM provider.
61+
62+
This table contains the network requirements to configure GHES SCIM with an IdP:
63+
64+
| System | Direction | Purpose | Protocol / Port | Notes |
65+
|------------|------------|----------|------------------|-------|
66+
| GitHub Enterprise Server | Inbound | Receives SCIM API requests from IdP for users and groups | TCP 443 (HTTPS) | [AUTOTITLE](/enterprise-server/rest/enterprise-admin/scim) must be reachable from IdP |
67+
| Identity Provider (IdP) | Outbound | Sends SCIM provisioning requests to GitHub for users and groups | TCP 443 (HTTPS) | IdP acts as SCIM client, initiating outbound HTTPS connections to GitHub's SCIM API endpoints. |
68+
6169
* For authentication, your instance must use SAML SSO, or a mix of SAML and built-in authentication.
6270
* You cannot mix SCIM with other external authentication methods. If you use CAS or LDAP, you will need to migrate to SAML before using SCIM.
6371
* After you have configured SCIM, you must keep SAML authentication enabled to continue using SCIM.

0 commit comments

Comments
 (0)