Skip to main content

Désactivation de l’authentification pour les utilisateurs gérés par l’entreprise

Vous pouvez désactiver l’authentification unique (SSO) SAML ou OIDC pour Enterprise Managed Users à l’aide d’un code de récupération pour vous connecter en tant qu’utilisateur de configuration.

Qui peut utiliser cette fonctionnalité ?

The setup user can disable SAML or OIDC authentication for Enterprise Managed Users.

About disabled authentication for Enterprise Managed Users

After you disable SAML or OIDC authentication for your enterprise, the following effects apply:

If you later reconfigure authentication for the enterprise, external groups must be reprovisioned via SCIM, and managed user accounts must be reprovisioned before users can sign in.

Remarque

When a managed user account is suspended, the user's avatar is permanently deleted. If you reprovision the user, the user will need to reupload their avatar.

If you want to migrate to a new identity provider (IdP) or tenant rather than disabling authentication entirely, see Migrating your enterprise to a new identity provider or tenant.

Disabling authentication

Avertissement

Disabling authentication and provisioning will prevent your enterprise's managed user accounts from signing in to access your enterprise on GitHub.

  1. Sign in as the setup user for your enterprise with the username SHORTCODE_admin, replacing SHORTCODE with your enterprise's shortcode.
  2. Attempt to access your enterprise account, and use a recovery code to bypass SAML SSO or OIDC. For more information, see Accessing your enterprise account if your identity provider is unavailable.
  3. In the top-right corner of GitHub, click your profile picture, then click Enterprise.
  4. At the top of the page, click Identity provider.
  5. Under Identity Provider, click Single sign-on configuration.
  6. Next to "SAML single sign-on" or "OIDC single sign-on", click to deselect SAML single sign-on or OIDC single sign-on.
  7. To confirm, click Disable SAML single sign-on or Disable OIDC single sign-on.