GitHub - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This section describes how to integrate Microsoft Github with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create from Template and then click the Select button next to SAML Direct.
- Choose Cloud on the Basic Information page.
- Enter the name for the application and click the Next Step button.
- On the Connection Profile page, Navigate to Initiate SAML Workflow section and choose IdP-initiated.
- Scroll down to the Service Provider section and provide its details in the following format:
- Assertion Consumer Service (ACS) URL: https://github.com/enterprises/<enterprise-url-slug>/saml/consume
- Audience (Service Provider Entity ID): https://github.com/enterprises/<enterprise- url-slug>
- In the Identity Provider section, take note of the Identity Provider URL, as this value will be required later in the Microsoft GitHub configuration.
- Under the Message Protection section, choose IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- In the User Identity section, select Identifier Type as unspecified and Property as mail.
- Click Next Step.
- On the User Access page, choose the access policy you want to use to determine which users can access the application, then click Next Step.
- On the Portal Display page, configure the portal display and other settings. Then click Next Step.
- On the Fulfillment page, configure your preferred settings or leave the Fulfillment toggle button disabled as it is, then click Save and Finish.
- Locate the application just created in My Applications page and click the dropdown arrow next to Edit > Export Metadata.
- Click Publish Changes and wait for the operation to be completed.
- After publishing, your application is now enabled for SSO.
The configuration is complete.
Configure Microsoft Github
Perform these steps to configure Microsoft Github.
Pre-requisites
- Before configuring Microsoft GitHub, start by signing up for GitHub Enterprise Cloud and creating your enterprise account.
- Ensure you select Enterprise with managed users option when setting up your GitHub Enterprise Cloud account.
- After selecting Enterprise with managed users, you’ll be prompted to enter details about your GitHub Enterprise Cloud.
- Enterprise name: Provide a name of your choice for the enterprise.
- Enterprise URL slug: Enter a custom URL slug for your enterprise (The enterprise URL will appear as: https://github.com/enterprises/your-slug).
- Username shortcode: Enter a shortcode to be used in member usernames (e.g., usernames will appear as username_rsapelab).
- Industry: Select the industry that best represents the primary focus or purpose of this enterprise.
- Number of employees: Choose the employee range that this enterprise is intended to support.
- Country/Region: Choose the country and region where your enterprise is based.
- Identity Provider: Choose Custom or other.
- You will then be prompted to enter an enterprise account as an admin to manage the GitHub Enterprise Cloud configuration.
- After that, you will receive an email with your admin username and be prompted to set up your identity provider.
Procedure
- Log in to GitHub enterprise cloud as an admin: https://github.com/login.
- Click the Identity Provider tab at the top.
- In the Single sign-on configuration section, under SAML single sign-on, click Add SAML Configuration.
- Under SAML Single Sign-On, enter all the required details in the following format:
- Sign-on URL: This is the Identity Provider URL previously obtained from the RSA Cloud Authentication Service configuration.
- Issuer: This is the Identity Provider URL previously obtained from the RSA Cloud Authentication Service configuration.
- Public certificate: Upload the certificate downloaded from RSA Cloud Authentication Service.
- Click Test SAML Configuration to verify the setup. Upon successful testing, you will receive confirmation, after which you can click Save SAML Settings.
- After that, you will be redirected to a page displaying recovery codes. You will have the option to download, print, or copy them in case you ever get locked out and can't sign in.
- Click on Enable SAML authentication.
- Go to the Identity Provider tab, where you will now see that SAML Single Sign-On is enabled.
Test Application
- Enter your username or email address in the text field, and the option to Sign in with your identity provider will be displayed.
- You will then be prompted to confirm that you will authenticate your account by signing in through your enterprise's Single Sign-On (SSO) provider.
Notes
- After enabling SAML authentication, all members of your enterprise must use Single Sign-On (SSO) with your configured Identity Provider (IdP) to access any of the enterprise's organizations. This means that all organizations within the enterprise will be authenticated through the configured IdP.
- The ACS URL can be obtained from the Microsoft GitHub configuration during the SAML Single Sign-On setup.
- Entity ID can be obtained from the ACS URL by removing /saml/consume from the URL.
The configuration is complete.
Related Articles
Configure Attribute Mappings for Identity Verification Providers 11Number of Views Cloud Access Service - Identity Providers 31Number of Views Certificates and Keys for Service Providers and Identity Providers for the SSO Agent 19Number of Views Manage Identity Providers 18Number of Views Identity Verification Providers 35Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?