Configuring GitHub Enterprise
Users can securely log on to GitHub using their enterprise credentials.
To configure GitHub Enterprise for SSO through SAML, follow the steps below:
1. Access your GitHub Enterprise site for example: [Link]
2. To log on to your GitHub Enterprise account as an administrator, click Sign in with a
username and password link.
Citrix Gateway 1
3. Type user name and password and click Sign in.
4. On the home page, in the upper right corner, click the Site Admin icon .
5. Click Management console.
Citrix Gateway 2
6. Type the password to access Management console.
7. On the Settings page, click Authentication.
8. In the Authentication section, specify the following information:
i. Click the autentication type SAML.
Citrix Gateway 3
ii. To allow authentication of users who do not have access to your identity provider that
uses SAML, select the Allow creation of accounts with built-in authentication (for
users not in SAML) check box.
iii. If you do not want to demote or promote users based on attributes sent in SAML, select
the Disable administrator demotion/promotion. (ignore the administrator
attribute) check box.
iv. Single sign-on URL - type the IdP URL followed by /saml/login. For example:
[Link]
v. Issuer - type a unique issuer name.
vi. Signature Method - click RSA-SHA256.
vii. Digest Method - click SHA256.
viii. Name Identifier Format - click unspecified.
ix. In the Verification certificate area, to upload the IDP signing certificate, click Choose
File.
Browse to the folder where you saved the IdP provided certificate and upload it. Based
on the certificate that you upload, the values for the fields Domain, Alternate names,
Issuer, Valid From, and Expires After are automatically populated.
To obtain your IdP certificate, follow the steps below:
i. Remotely access your NetScaler instance using PuTTY.
ii. Navigate to /nsconfig/ssl folder (using shell command cd /nsconfig/ssl) and
press Enter.
iii. Type cat <certificate name> and press Enter.
Note: Replace <certificate name> with your IdP signing certificate name.
iv. Copy the text from -----BEGIN CERTIFICATE----- to -----END CERTIFICATE-----.
v. Paste the text in a text editor and save the file in an appropriate format such
as <your IDP signing Certificate>.pem.
9. Click Save Settings.
You have completed the required configuration on the service provider which is in this case –
GitHub Enterprise.
Citrix Gateway 4