Skip to content

Commit 04022c2

Browse files
authored
Update reusable that navigates to enterprise settings to include engagement CTA (#59740)
1 parent 960945c commit 04022c2

File tree

16 files changed

+22
-24
lines changed

16 files changed

+22
-24
lines changed

content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-access-to-githubcom-using-a-corporate-proxy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This feature requires an external firewall or proxy. {% data variables.contact.g
1717

1818
This feature is not enabled by default. An enterprise owner can enable the feature for your enterprise.
1919

20-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
20+
{% data reusables.enterprise-accounts.access-enterprise %}
2121
{% data reusables.enterprise-accounts.settings-tab %}
2222
1. Under {% octicon "gear" aria-hidden="true" aria-label="gear" %} **Settings**, click **Authentication security**.
2323
1. In the "Enterprise access restrictions" section, select **Enable enterprise access restrictions**.
@@ -42,7 +42,7 @@ sec-GitHub-allowed-enterprise: ENTERPRISE-ID
4242

4343
An enterprise owner can identify the correct enterprise ID to use in the header for your enterprise.
4444

45-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
45+
{% data reusables.enterprise-accounts.access-enterprise %}
4646
{% data reusables.enterprise-accounts.settings-tab %}
4747
1. Under {% octicon "gear" aria-hidden="true" aria-label="gear" %} **Settings**, click **Authentication security**.
4848
1. In the "Enterprise access restrictions" section, find the header for your enterprise.

content/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ If "Automatically redirect users to sign in" is enabled, {% data variables.produ
147147
> [!NOTE]
148148
> If a user is signed in to their personal account when they attempt to access any of your enterprise's resources, they'll be automatically signed out and redirected to SSO to sign in to their {% data variables.enterprise.prodname_managed_user %}. For more information, see [AUTOTITLE](/enterprise-cloud@latest/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-your-personal-account/managing-multiple-accounts).
149149
150-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
150+
{% data reusables.enterprise-accounts.access-enterprise %}
151151
{% data reusables.enterprise-accounts.identity-provider-tab %}
152152
{% data reusables.enterprise-accounts.sso-configuration %}
153153
1. Under "Single sign-on settings", select or deselect **Automatically redirect users to sign in**.

content/admin/managing-accounts-and-repositories/managing-users-in-your-enterprise/removing-a-member-from-your-enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ If the enterprise member you're removing is the last owner of an organization ow
2222

2323
>[!TIP] For automated offboarding, you can also remove users with the GraphQL API. See [AUTOTITLE](/graphql/reference/mutations#removeenterprisemember).
2424
25-
{% data reusables.enterprise-accounts.access-enterprise-personal-accounts %}
25+
{% data reusables.enterprise-accounts.access-enterprise %}
2626
{% data reusables.enterprise-accounts.people-tab %}
2727
1. To the right of the person you want to remove, select the {% octicon "kebab-horizontal" aria-label="Member settings" %} dropdown menu and click **Remove from enterprise**.
2828

content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-oidc-for-enterprise-managed-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ OIDC does not support IdP-initiated authentication.
4848
## Configuring OIDC for Enterprise Managed Users
4949

5050
1. Sign into {% data variables.product.prodname_dotcom %} as the setup user for your new enterprise with the username **@SHORT-CODE_admin**.
51-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
51+
{% data reusables.enterprise-accounts.access-enterprise %}
5252
{% data reusables.enterprise-accounts.identity-provider-tab %}
5353
{% data reusables.enterprise-accounts.sso-configuration %}
5454
1. Under "OIDC single sign-on", select **Enable OIDC configuration**.

content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-saml-single-sign-on-for-enterprise-managed-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ After the initial configuration of SAML SSO, the only setting you can update on
104104
> {% data reusables.enterprise-accounts.emu-password-reset-session %}
105105
106106
1. If you're using a **non-partner IdP** (an IdP other than Okta, PingFederate or Entra ID), before enabling SAML, you must update a setting so that you will be able to set up SCIM using the REST API. See [AUTOTITLE](/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users#configuring-provisioning-for-other-identity-management-systems).
107-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
107+
{% data reusables.enterprise-accounts.access-enterprise %}
108108
{% data reusables.enterprise-accounts.identity-provider-tab %}
109109
{% data reusables.enterprise-accounts.sso-configuration %}
110110

content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/disabling-authentication-and-provisioning-for-enterprise-managed-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ If you want to migrate to a new identity provider (IdP) or tenant rather than di
4141
4242
{% data reusables.emus.sign-in-as-setup-user %}
4343
1. Attempt to access your enterprise account, and use a recovery code to bypass SAML SSO or OIDC. For more information, see [AUTOTITLE](/admin/identity-and-access-management/managing-recovery-codes-for-your-enterprise/accessing-your-enterprise-account-if-your-identity-provider-is-unavailable).
44-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
44+
{% data reusables.enterprise-accounts.access-enterprise %}
4545
{% data reusables.enterprise-accounts.identity-provider-tab %}
4646
{% data reusables.enterprise-accounts.sso-configuration %}
4747
1. Next to "SAML single sign-on" or "OIDC single sign-on", click to deselect **SAML single sign-on** or **OIDC single sign-on**.

content/admin/managing-iam/managing-recovery-codes-for-your-enterprise/downloading-your-enterprise-accounts-single-sign-on-recovery-codes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ If you did not save your recovery codes when you configured SSO, you can still a
2222

2323
## Downloading codes for an enterprise with personal accounts
2424

25-
{% data reusables.enterprise-accounts.access-enterprise-personal-accounts %}
25+
{% data reusables.enterprise-accounts.access-enterprise %}
2626
{% data reusables.enterprise-accounts.settings-tab %}
2727
{% data reusables.enterprise-accounts.security-tab %}
2828

@@ -33,7 +33,7 @@ If you did not save your recovery codes when you configured SSO, you can still a
3333

3434
## Downloading codes for an enterprise with {% data variables.product.prodname_emus %}
3535

36-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
36+
{% data reusables.enterprise-accounts.access-enterprise %}
3737
{% data reusables.enterprise-accounts.identity-provider-tab %}
3838
{% data reusables.enterprise-accounts.sso-configuration %}
3939

content/admin/managing-iam/provisioning-user-accounts-with-scim/configuring-scim-provisioning-for-users.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ To ensure you can continue to sign in and configure settings when SCIM is enable
136136
## 4. Enable SCIM on your instance
137137

138138
1. Sign in to your instance as the **built-in setup user** you created earlier.
139-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
139+
{% data reusables.enterprise-accounts.access-enterprise %}
140140
{% data reusables.enterprise-accounts.settings-tab %}
141141
{% data reusables.enterprise-accounts.security-tab %}
142142
1. Under "SCIM Configuration", select **Enable SCIM configuration**.
@@ -203,7 +203,7 @@ If you don't use a partner IdP, or if you only use a partner IdP for SAML authen
203203
> [!NOTE]
204204
> {% data reusables.enterprise-accounts.emu-password-reset-session %}
205205
206-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
206+
{% data reusables.enterprise-accounts.access-enterprise %}
207207
{% data reusables.enterprise-accounts.identity-provider-tab %}
208208
{% data reusables.enterprise-accounts.sso-configuration %}
209209
1. Under "Open SCIM Configuration", select "Enable open SCIM configuration".

content/admin/managing-iam/reconfiguring-iam-for-enterprise-managed-users/migrating-from-oidc-to-saml.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ If you're new to {% data variables.product.prodname_emus %} and haven't yet conf
3737
## Migrating your enterprise
3838

3939
{% data reusables.emus.sign-in-as-setup-user %}
40-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
40+
{% data reusables.enterprise-accounts.access-enterprise %}
4141
{% data reusables.emus.use-enterprise-recovery-code %}
4242
{% data reusables.enterprise-accounts.identity-provider-tab %}
4343
{% data reusables.enterprise-accounts.sso-configuration %}

content/admin/managing-iam/reconfiguring-iam-for-enterprise-managed-users/migrating-from-saml-to-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To migrate your enterprise from SAML to OIDC, you will disable your existing {%
4646
1. Before you begin the migration, sign in to Azure and disable provisioning in the existing {% data variables.product.prodname_emu_idp_application %} application.
4747
1. If you use [Conditional Access (CA) network location policies](https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition) in Entra ID, and you're currently using an IP allow list with your enterprise account or any of the organizations owned by the enterprise account, disable the IP allow lists. See [AUTOTITLE](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise#managing-allowed-ip-addresses-for-organizations-in-your-enterprise) and [AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-allowed-ip-addresses-for-your-organization).
4848
{% data reusables.emus.sign-in-as-setup-user %}
49-
{% data reusables.enterprise-accounts.access-enterprise-emu %}
49+
{% data reusables.enterprise-accounts.access-enterprise %}
5050
{% data reusables.emus.use-enterprise-recovery-code %}
5151
{% data reusables.enterprise-accounts.identity-provider-tab %}
5252
{% data reusables.enterprise-accounts.sso-configuration %}

0 commit comments

Comments
 (0)