GitHub - SAML Relying Party Configuration - RSA Ready Implementation Guide
This section describes how to integrate Microsoft Github with RSA Cloud Authentication Service using Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using Relying Party.
Procedure
- Sign in to RSA Cloud Administration Console.
- Select the Authentication Clients > Relying Parties menu item at the top of the page.
- Click the Add a Relying Party button on the My Relying Parties page.
- From the Relying Party Catalog select the Add button for Service Provider SAML.
- Enter the name for the application in the Name field on the Basic Information page and click the Next Step button.
- On the Authentication page, select SecurID manages all authentication.
- From 2.0 Access Policy for Authentication pulldown select a policy that was previously configured, then select Next Step.
- Select the Enter Manually button on the Connection Profile page.
- Go to the Service Provider section and provide its details in the following format:
- Assertion Consumer Service (ACS) URL: https://github.com/enterprises/<enterprise-url-slug>/saml/consume
- Audience (Service Provider Entity ID): https://github.com/enterprises/<enterprise- url-slug>
- Under the SAML Response Protection section, select the radio button for IdP signs assertion within response, then click Download Certificate — you’ll need this certificate later when configuring Microsoft Github.
- Scroll down to the User Identity section and select the following:
- Identifier Type – unspecified
- Property – mail
- Make note of the Entity ID under the Identity Provider section. You can enter any identifier in the Discriminator text field—it will be appended to the Entity ID URL to ensure the Entity ID is unique to the Service Provider.
The configuration is complete.
Configure Microsoft Github
Perform these steps to configure Microsoft Github.
Pre-requisites
- Before configuring Microsoft GitHub, start by signing up for GitHub Enterprise Cloud and creating your enterprise account.
- Ensure you select Enterprise with managed users option when setting up your GitHub Enterprise Cloud account.
- After selecting Enterprise with managed users, you’ll be prompted to enter details about your GitHub Enterprise Cloud.
- Enterprise name: Provide a name of your choice for the enterprise.
- Enterprise URL slug: Enter a custom URL slug for your enterprise (The enterprise URL will appear as: https://github.com/enterprises/your-slug).
- Username shortcode: Enter a shortcode to be used in member usernames (e.g., usernames will appear as username_rsapelab).
- Industry: Select the industry that best represents the primary focus or purpose of this enterprise.
- Number of employees: Choose the employee range that this enterprise is intended to support.
- Country/Region: Choose the country and region where your enterprise is based.
- Identity Provider: Choose Custom or other.
- You will then be prompted to enter an enterprise account as an admin to manage the GitHub Enterprise Cloud configuration.
- After that, you will receive an email with your admin username and be prompted to set up your identity provider.
Procedure
- Log in to GitHub enterprise cloud as an admin: https://github.com/login.
- Click the Identity Provider tab at the top.
- In the Single sign-on configuration section, under SAML single sign-on, click Add SAML Configuration.
- In SAML Single Sign-On, enter all the required details in the following format:
- Sign-on URL: This is the Identity Provider Entity ID URL previously obtained from the RSA Cloud Authentication Service configuration.
- Issuer: This is the Identity Provider Entity ID URL previously obtained from the RSA Cloud Authentication Service configuration.
- Public certificate: Upload the certificate downloaded from RSA Cloud Authentication Service.
- Click Test SAML Configuration to verify the setup. Upon successful testing, you will receive confirmation, after which you can click Save SAML Settings.
- After that, you will be redirected to a page displaying recovery codes. You will have the option to download, print, or copy them in case you ever get locked out and can't sign in.
- Click Enable SAML authentication.
- Go to the Identity Provider tab, where you will now see that SAML Single Sign-On is enabled.
Test Application
- Enter your username or email address in the text field, and the option to Sign in with your identity provider will be displayed.
- You will then be prompted to confirm that you will authenticate your account by signing in through your enterprise's Single Sign-On (SSO) provider.
Notes
- After enabling SAML authentication, all members of your enterprise must use Single Sign-On (SSO) with your configured Identity Provider (IdP) to access any of the enterprise's organizations. This means that all organizations within the enterprise will be authenticated through the configured IdP.
- The ACS URL can be obtained from the Microsoft GitHub configuration during the SAML Single Sign-On setup.
- Entity ID can be obtained from the ACS URL by removing /saml/consume from the URL.
The configuration is complete.
Related Articles
Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 233Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 499Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 85Number of Views Okta - SAML Relying Party Configuration - RSA Ready Implementation Guide 45Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?