Skip to content

Commit e990f33

Browse files
authored
Merge pull request #12499 from github/repo-sync
repo sync
2 parents 219e371 + c282bd7 commit e990f33

10 files changed

Lines changed: 103 additions & 16 deletions

File tree

.github/actions-scripts/content-changes-table-comment.js

100644100755
File mode changed.

content/organizations/managing-saml-single-sign-on-for-your-organization/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ children:
2222
- /downloading-your-organizations-saml-single-sign-on-recovery-codes
2323
- /managing-team-synchronization-for-your-organization
2424
- /accessing-your-organization-if-your-identity-provider-is-unavailable
25+
- /troubleshooting-identity-and-access-management
2526
shortTitle: Manage SAML single sign-on
2627
---
2728

content/organizations/managing-saml-single-sign-on-for-your-organization/managing-team-synchronization-for-your-organization.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,6 @@ shortTitle: Manage team synchronization
2020

2121
{% data reusables.enterprise-accounts.emu-scim-note %}
2222

23-
{% data reusables.gated-features.okta-team-sync %}
24-
2523
## About team synchronization
2624

2725
You can enable team synchronization between your IdP and {% data variables.product.product_name %} to allow organization owners and team maintainers to connect teams in your organization with IdP groups.
@@ -65,12 +63,22 @@ You must have a linked SAML identity. To create a linked identity, you must auth
6563

6664
### Enabling team synchronization for Okta
6765

66+
Okta team synchronization requires that SAML and SCIM with Okta have already been set up for your organization.
67+
68+
To avoid potential team synchronization errors with Okta, we recommend that you confirm that SCIM linked identities are correctly set up for all organization members who are members of your chosen Okta groups, before enabling team synchronization on {% data variables.product.prodname_dotcom %}.
69+
70+
If an organization member does not have a linked SCIM identity, then team synchronization will not work as expected and the user may not be added or removed from teams as expected. If any of these users are missing a SCIM linked identity, you will need to reprovision them.
71+
72+
For help on provisioning users that have missing a missing SCIM linked identity, see "[Troubleshooting identity and access management](/organizations/managing-saml-single-sign-on-for-your-organization/troubleshooting-identity-and-access-management)."
73+
6874
{% data reusables.identity-and-permissions.team-sync-okta-requirements %}
6975

7076
{% data reusables.profile.access_org %}
7177
{% data reusables.profile.org_settings %}
7278
{% data reusables.organizations.security %}
7379
{% data reusables.identity-and-permissions.team-sync-confirm-saml %}
80+
{% data reusables.identity-and-permissions.team-sync-confirm-scim %}
81+
1. Consider enforcing SAML in your organization to ensure that organization members link their SAML and SCIM identities. For more information, see "[Enforcing SAML single sign-on for your organization](/organizations/managing-saml-single-sign-on-for-your-organization/enforcing-saml-single-sign-on-for-your-organization)."
7482
{% data reusables.identity-and-permissions.enable-team-sync-okta %}
7583
7. Under your organization's name, type a valid SSWS token and the URL to your Okta instance.
7684
![Enable team synchronization Okta organization form](/assets/images/help/teams/confirm-team-synchronization-okta-organization.png)
Lines changed: 87 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,87 @@
1+
---
2+
title: Troubleshooting identity and access management
3+
intro: 'Review and resolve common troubleshooting errors for managing your organization''s SAML SSO, team synchronization, or identity provider (IdP) connection.'
4+
product: '{% data reusables.gated-features.saml-sso %}'
5+
versions:
6+
fpt: '*'
7+
ghec: '*'
8+
topics:
9+
- Organizations
10+
- Teams
11+
shortTitle: Troubleshooting access
12+
---
13+
14+
## Some users are not provisioned or deprovisioned by SCIM
15+
16+
When you encounter provisioning issues with users, we recommend that you check if the users are missing SCIM metadata. If an organization member has missing SCIM metadata, then you can re-provision SCIM for the user manually through your IdP.
17+
18+
### Auditing users for missing SCIM metadata
19+
20+
If you suspect or notice that any users are not provisioned or deprovisioned as expected, we recommend that you audit all users in your organization.
21+
22+
To check whether users have a SCIM identity (SCIM metadata) in their external identity, you can review SCIM metadata for one organization member at a time on {% data variables.product.prodname_dotcom %} or you can programatically check all organization members using the {% data variables.product.prodname_dotcom %} API.
23+
24+
#### Auditing organization members on {% data variables.product.prodname_dotcom %}
25+
26+
As an organization owner, to confirm that SCIM metadata exists for a single organization member, visit this URL, replacing `<organization>` and `<username>`:
27+
28+
> `https://github.com/orgs/<organization>/people/<username>/sso`
29+
30+
If the user's external identity includes SCIM metadata, the organization owner should see a SCIM identity section on that page. If their external identity does not include any SCIM metadata, the SCIM Identity section will not exist.
31+
32+
#### Auditing organization members through the {% data variables.product.prodname_dotcom %} API
33+
34+
As an organization owner, you can also query the SCIM REST API or GraphQL to list all SCIM provisioned identities in an organization.
35+
36+
#### Using the REST API
37+
38+
The SCIM REST API will only return data for users that have SCIM metadata populated under their external identities. We recommend you compare a list of SCIM provisioned identities with a list of all your organization members.
39+
40+
For more information, see:
41+
- "[List SCIM provisioned identities](/rest/reference/scim#list-scim-provisioned-identities)"
42+
- "[List organization members](/rest/reference/orgs#list-organization-members)"
43+
44+
#### Using GraphQL
45+
46+
This GraphQL query shows you the SAML `NameId`, the SCIM `UserName` and the {% data variables.product.prodname_dotcom %} username (`login`) for each user in the organization. To use this query, replace `ORG` with your organization name.
47+
48+
```graphql
49+
{
50+
organization(login: "ORG") {
51+
samlIdentityProvider {
52+
ssoUrl
53+
externalIdentities(first: 100) {
54+
edges {
55+
node {
56+
samlIdentity {
57+
nameId
58+
}
59+
scimIdentity {
60+
username
61+
}
62+
user {
63+
login
64+
}
65+
}
66+
}
67+
}
68+
}
69+
}
70+
}
71+
```
72+
73+
```shell
74+
curl -X POST -H "Authorization: Bearer <personal access token>" -H "Content-Type: application/json" -d '{ "query": "{ organization(login: \"ORG\") { samlIdentityProvider { externalIdentities(first: 100) { pageInfo { endCursor startCursor hasNextPage } edges { cursor node { samlIdentity { nameId } scimIdentity {username} user { login } } } } } } }" }' https://api.github.com/graphql
75+
```
76+
77+
For more information on using the GraphQL API, see:
78+
- "[GraphQL guides](/graphql/guides)"
79+
- "[GraphQL explorer](/graphql/overview/explorer)"
80+
81+
### Re-provisioning SCIM for users through your identity provider
82+
83+
You can re-provision SCIM for users manually through your IdP. For example, to resolve provisioning errors, in the Okta admin portal, you can unassign and reassign users to the {% data variables.product.prodname_dotcom %} app. This should trigger Okta to make an API call to populate the SCIM metadata for these users on {% data variables.product.prodname_dotcom %}. For more information, see "[Unassign users from applications](https://help.okta.com/en/prod/Content/Topics/users-groups-profiles/usgp-unassign-apps.htm)" or "[Assign users to applications](https://help.okta.com/en/prod/Content/Topics/users-groups-profiles/usgp-assign-apps.htm)" in the Okta documentation.
84+
85+
To confirm that a user's SCIM identity is created, we recommend testing this process with a single organization member whom you have confirmed doesn't have a SCIM external identity. After manually updating the users in your IdP, you can check if the user's SCIM identity was created using the SCIM API or on {% data variables.product.prodname_dotcom %}. For more information, see "[Auditing users for missing SCIM metadata](#auditing-users-for-missing-scim-metadata)" or the REST API endpoint "[Get SCIM provisioning information for a user](/rest/reference/scim#get-scim-provisioning-information-for-a-user)."
86+
87+
If re-provisioning SCIM for users doesn't help, please contact {% data variables.product.prodname_dotcom %} Support.

content/organizations/organizing-members-into-teams/synchronizing-a-team-with-an-identity-provider-group.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,6 @@ topics:
1515
shortTitle: Synchronize with an IdP
1616
---
1717

18-
{% data reusables.gated-features.okta-team-sync %}
19-
2018
{% data reusables.enterprise-accounts.emu-scim-note %}
2119

2220
## About team synchronization

data/reusables/gated-features/okta-team-sync.md

Lines changed: 0 additions & 9 deletions
This file was deleted.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
3. Confirm that SAML SSO is enabled. For more information, see "[Managing SAML single sign-on for your organization](/organizations/managing-saml-single-sign-on-for-your-organization/)."
1+
3. Confirm that SAML SSO is enabled for your organization. For more information, see "[Managing SAML single sign-on for your organization](/organizations/managing-saml-single-sign-on-for-your-organization/)."
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
1. We recommend you confirm that your users have SAML enabled and have a linked SCIM identity to avoid potential provisioning errors. For help auditing your users, see "[Auditing users for missing SCIM metadata](/organizations/managing-saml-single-sign-on-for-your-organization/troubleshooting-identity-and-access-management#auditing-users-for-missing-scim-metadata)." For help resolving unlinked SCIM identities, see "[Troubleshooting identity and access management](/organizations/managing-saml-single-sign-on-for-your-organization/troubleshooting-identity-and-access-management)."
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
To enable team synchronization for Okta, you or your IdP administrator must:
1+
Before you enable team synchronization for Okta, you or your IdP administrator must:
22

3-
- Enable SAML SSO and SCIM for your organization using Okta. For more information, see "[Configuring SAML single sign-on and SCIM using Okta](/organizations/managing-saml-single-sign-on-for-your-organization/configuring-saml-single-sign-on-and-scim-using-okta)."
3+
- Configure the SAML, SSO, and SCIM integration for your organization using Okta. For more information, see "[Configuring SAML single sign-on and SCIM using Okta](/organizations/managing-saml-single-sign-on-for-your-organization/configuring-saml-single-sign-on-and-scim-using-okta)."
44
- Provide the tenant URL for your Okta instance.
55
- Generate a valid SSWS token with read-only admin permissions for your Okta installation as a service user. For more information, see [Create the token](https://developer.okta.com/docs/guides/create-an-api-token/create-the-token/) and [Service users](https://help.okta.com/en/prod/Content/Topics/Adv_Server_Access/docs/service-users.htm) in Okta's documentation.

data/reusables/saml/okta-edit-provisioning.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
9. To avoid syncing errors and confirm that your users have SAML enabled and SCIM linked identities, we recommend you audit your organization's users. For more information, see "[Auditing users for missing SCIM metadata](/organizations/managing-saml-single-sign-on-for-your-organization/troubleshooting-identity-and-access-management#auditing-users-for-missing-scim-metadata)."
12
10. To the right of "Provisioning to App", click **Edit**.
23
!["Edit" button for Okta application's provisioning options](/assets/images/help/saml/okta-provisioning-to-app-edit-button.png)
34
11. To the right of "Create Users", select **Enable**.

0 commit comments

Comments
 (0)