Skip to content

Commit 00c0125

Browse files
authored
Merge pull request #42861 from github/repo-sync
Repo sync
2 parents 598d6d3 + 574fd5b commit 00c0125

File tree

14 files changed

+145
-135
lines changed

14 files changed

+145
-135
lines changed

content/admin/concepts/identity-and-access-management/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ topics:
1010
children:
1111
- /identity-and-access-management-fundamentals
1212
- /enterprise-managed-users
13+
- /setup-user
1314
- /user-offboarding
1415
contentType: concepts
1516
---
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
title: Setup user
3+
intro: 'The setup user is used to configure authentication and provisioning for {% data variables.product.prodname_emus %}.'
4+
versions:
5+
ghec: '*'
6+
topics:
7+
- Accounts
8+
- Enterprise
9+
- Fundamentals
10+
---
11+
12+
## How should I use the setup user?
13+
14+
The setup user is **only** intended to be used for:
15+
16+
* Configuring authentication and provisioning
17+
* SCIM provisioning via its {% data variables.product.pat_generic %}
18+
* Regaining access to your enterprise in the event of an issue with your identity provider, by utilizing the enterprise's SAML recovery codes
19+
20+
For other enterprise administration tasks, such as creating organizations, use a provisioned managed user account with the appropriate administrative role.
21+
22+
## How do I sign in as the setup user?
23+
24+
After we create your enterprise, you will receive an **email** inviting you to choose a password for the setup user.
25+
26+
When you create the password, you should enable two-factor authentication (2FA) for the account. All subsequent login attempts for the setup user account will require a successful 2FA challenge response.
27+
28+
If the enterprise account has enabled single sign-on and the setup user has **not** enabled 2FA, they must use an enterprise recovery code to authenticate. To avoid being locked out of your account, after enabling single sign-on, **save your enterprise recovery codes**. See [AUTOTITLE](/admin/managing-iam/managing-recovery-codes-for-your-enterprise/downloading-your-enterprise-accounts-single-sign-on-recovery-codes#downloading-codes-for-an-enterprise-with-enterprise-managed-users).
29+
30+
{% data reusables.enterprise-accounts.emu-password-reset-session %}

content/admin/data-residency/getting-started-with-data-residency-for-github-enterprise-cloud.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,10 +71,9 @@ Using an **incognito or private browsing window**:
7171

7272
> [!NOTE]
7373
> If 2FA isn't enabled, you will need to enter your enterprise's single sign-on (SSO) recovery code each time you sign in as the setup user. You can download these codes once SSO is enabled.
74-
7574
{% data reusables.enterprise-accounts.emu-recommend-password-manager %}
7675

77-
{% data reusables.enterprise-accounts.emu-password-reset-session %}
76+
{% data reusables.enterprise-accounts.about-setup-user %}
7877

7978
### Create a {% data variables.product.pat_generic %}
8079

content/admin/managing-iam/understanding-iam-for-enterprises/getting-started-with-enterprise-managed-users.md

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -40,21 +40,9 @@ Using an **incognito or private browsing window**:
4040

4141
> [!WARNING]
4242
> All subsequent login attempts for the setup user account will require a successful 2FA challenge response.
43-
44-
> [!IMPORTANT]
45-
> If the enterprise account has enabled single sign-on and the setup user hasn’t enabled 2FA, they must use an enterprise recovery code to authenticate. To avoid being locked out of your account, after enabling single sign-on, save your enterprise recovery codes. For more information, see [AUTOTITLE](/admin/managing-iam/managing-recovery-codes-for-your-enterprise/downloading-your-enterprise-accounts-single-sign-on-recovery-codes#downloading-codes-for-an-enterprise-with-enterprise-managed-users) and the related [changelog on {% data variables.product.prodname_blog %}](https://github.blog/changelog/2025-01-17-setup-user-for-emu-enterprises-requires-2fa-or-use-of-a-recovery-code/).
46-
47-
{% data reusables.enterprise-accounts.emu-password-reset-session %}
48-
4943
{% data reusables.enterprise-accounts.emu-recommend-password-manager %}
5044

51-
> [!NOTE]
52-
> Once single sign-on has been configured on the enterprise, the setup user is only intended to be used going forwards for:
53-
>
54-
> * SCIM provisioning via its {% data variables.product.pat_generic %}.
55-
> * To regain access to your enterprise in the event of an issue with your identity provider by utilizing the enterprise's SAML recovery codes.
56-
>
57-
> For other enterprise administration tasks, you should use a provisioned managed user account with the enterprise owner role.
45+
{% data reusables.enterprise-accounts.about-setup-user %}
5846

5947
## Create a {% data variables.product.pat_generic %}
6048

content/code-security/concepts/security-at-scale/about-enabling-security-features-at-scale.md

Lines changed: 5 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -40,29 +40,19 @@ For more information on purchasing {% data variables.product.prodname_GH_cs_or_s
4040

4141
There are two types of {% data variables.product.prodname_security_configuration %}:
4242

43-
* **The {% data variables.product.prodname_github_security_configuration %}**. This configuration is a collection of enablement settings created and managed by subject matter experts at {% data variables.product.company_short %}. The {% data variables.product.prodname_github_security_configuration %} is designed to adequately secure any repository, and can easily be applied to all repositories in your organization.
44-
* **{% data variables.product.prodname_custom_security_configurations_caps %}**. These are configurations you can create and edit yourself, allowing you to choose different enablement settings for groups of repositories with specific security needs.
43+
* **The {% data variables.product.prodname_github_security_configuration %}**, which is a collection of enablement settings created and managed by subject matter experts at {% data variables.product.company_short %}
44+
* **{% data variables.product.prodname_custom_security_configurations_caps %}**, which are configurations you can create and edit yourself, allowing you to meet your specific security needs
4545

46-
{% endif %}
47-
48-
{% ifversion security-configurations-ghes-only %}
46+
For more detailed information on {% data variables.product.prodname_security_configurations %}, see [AUTOTITLE](/code-security/concepts/security-at-scale/security-configurations).
4947

50-
You can customize {% data variables.product.prodname_security_configurations %}, allowing you to choose different enablement settings for groups of repositories with specific security needs.
48+
{% elsif security-configurations-ghes-only %}
5149

52-
You will only ever see enablement settings for features that have been installed on your {% data variables.product.prodname_ghe_server %} instance by an enterprise administrator.
50+
{% data reusables.security-configurations.custom-configuration-intro-ghes %}
5351

5452
To learn how to create {% data variables.product.prodname_custom_security_configurations %}, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration).
5553

5654
{% endif %}
5755

58-
{% data reusables.code-scanning.custom-security-configuration-enforcement-edge-cases %}
59-
60-
Each repository can only have one {% data variables.product.prodname_security_configuration %} applied to it. {% ifversion security-configurations-cloud %}To find out how you should get started with {% data variables.product.prodname_security_configurations %}, see [AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/choosing-a-security-configuration-for-your-repositories).{% endif %}
61-
62-
{% ifversion security-configurations-api %}
63-
You can also create and manage security configurations using the REST API. For more information, see [AUTOTITLE](/rest/code-security/configurations).
64-
{% endif %}
65-
6656
## About {% data variables.product.prodname_global_settings %}
6757

6858
While {% data variables.product.prodname_security_configurations %} determine repository-level security settings, {% data variables.product.prodname_global_settings %} determine your organization-level security settings, which are then inherited by all repositories. With {% data variables.product.prodname_global_settings %}, you can customize how security features analyze your organization{% ifversion ghes < 3.16 %}, as well as grant a team permission to manage security alerts and settings across your organization{% endif %}.

content/code-security/concepts/security-at-scale/about-security-configurations.md

Lines changed: 0 additions & 46 deletions
This file was deleted.

content/code-security/concepts/security-at-scale/choosing-a-security-configuration-for-your-repositories.md

Lines changed: 0 additions & 50 deletions
This file was deleted.

content/code-security/concepts/security-at-scale/index.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,7 @@ topics:
1616
contentType: concepts
1717
children:
1818
- /about-enabling-security-features-at-scale
19-
- /about-security-configurations
20-
- /choosing-a-security-configuration-for-your-repositories
19+
- /security-configurations
2120
- /about-security-overview
2221
- /about-security-campaigns
2322
- /auditing-security-alerts

0 commit comments

Comments
 (0)