![]() ![]() Define who will be in scope for provisioning Learn more about adding an application from the gallery here. However it is recommended that you create a separate app when testing out the integration initially. If you have previously setup GitHub AE for SSO, you can use the same application. Add GitHub AE from the Azure AD application galleryĪdd GitHub AE from the Azure AD application gallery to start managing provisioning to GitHub AE. Learn how to enable provisioning for GitHub AE here. Configure GitHub AE to support provisioning with Azure AD Determine what data to map between Azure AD and GitHub AE.Determine who will be in scope for provisioning.Learn about how the provisioning service works.GitHub AE, fully initialized and configured for login with SAML SSO through your Azure AD tenant.A user account in Azure AD with permission to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator). ![]() The scenario outlined in this tutorial assumes that you already have the following prerequisites: Single sign-on to GitHub AE (recommended).Provision groups and group memberships in GitHub AE.Keep user attributes synchronized between Azure AD and GitHub AE.Remove users in GitHub AE when they do not require access anymore. ![]()
0 Comments
Leave a Reply. |