Logging SAML SSO authentication data for enterprise and org audit log events - [Beta Feedback] #37136
Replies: 8 comments 17 replies
-
Firstly, THANK YOU. This is awesome and solves the longstanding problem of "who in the world is userX?!" and now properly allows us to link GH handles to proper corporate identities in our logs. Secondly, is there a technical reason to not add the e.g., |
Beta Was this translation helpful? Give feedback.
-
I'm kind of wondering what is supposed to be exposed on an Organization level vs. on an Enterprise account level. Viewing the audit from the GitHub web interface I can see the Yet when using the REST API to query the audit log I only get the Bug or feature? |
Beta Was this translation helpful? Give feedback.
-
@boylejj could you briefly explain the difference between nameid and username? Would we ever expect the two to differ? In the logs I've seen, they're always the user's email. |
Beta Was this translation helpful? Give feedback.
-
Are there plans to add this to webhooks that get sent (not just the audit records), but regular webhooks. We have a few things that key off of this, and having the org id would be nice. |
Beta Was this translation helpful? Give feedback.
-
I have a case where the actor does not match the external_identity_nameid entry. It is for an action of org.remove_member. The actor is who performed it, but the external identity nameid is the user that was removed instead of the saml id. |
Beta Was this translation helpful? Give feedback.
-
Hi colleagues. One question and sorry for my ignorance, is there any way to track the progress of this feature? Thank you |
Beta Was this translation helpful? Give feedback.
-
Seems this was recently enabled for my Enterprise. |
Beta Was this translation helpful? Give feedback.
-
728969000018458575 |
Beta Was this translation helpful? Give feedback.
-
Private Beta Available Now!
Summary
SAML single sign-on (SSO) gives organization owners and enterprise owners a way to control and secure access to organization resources like repositories, issues, and pull requests. Organization owners can invite your personal account to join their organization that uses SAML SSO, which allows you to contribute to the organization and retain your existing identity and contributions on GitHub.
When you access resources within an organization that uses SAML SSO, GitHub will redirect you to the organization's SAML IdP to authenticate. After you successfully authenticate with your account on the IdP, the IdP redirects you back to GitHub, where you can access the organization's resources.
The purpose of this feature is to augment existing audit log events with the SAML identity associated with the organization. In doing so, enterprise and organization administrators will be able to track account activity associated with a specific SAML identity.
Intended Outcome
Enterprise and Organization owners will be able to track audit log activity associated with specific SAML SSO identities. By providing the SAML SSO identity as part of the audit log, enterprise and organization owners can quickly and easily link logs from multiple sourcing using the same SAML SSO identity identifiers.
How will it work?
The
external_identity_nameid
orexternal_identity_username
will be displayed in all audit log events where the SAML SSO identity was used as a means of authentication.Beta Was this translation helpful? Give feedback.
All reactions