Replies: 1 comment 1 reply
-
hello sir My GitHub Pages Sites Are Marked as Dangerous Hello GitHub Support, I am facing an issue where all of my GitHub Pages sites are being flagged as "Dangerous" by Google Safe Browsing and Chrome. Even after creating multiple new repositories and deploying different projects, the issue persists. I suspect that my GitHub account may have been incorrectly flagged. Could you please review my account and help resolve this issue? |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Managing Your Enterprise Identity Provider (IdP) Certificates
Maintaining the security and integrity of your enterprise's identity infrastructure is paramount. One crucial aspect of this is managing your Identity Provider (IdP) certificates. These certificates play a vital role in enabling Single Sign-On (SSO) and ensuring secure authentication for your GitHub Enterprise Managed Users (GHEC EMU) users.
Why is Certificate Management Important?
IdP certificates, like any other digital certificate, have an expiration date. If a certificate expires, users may be unable to log in to your GHEC EMU. This can lead to significant disruptions and impact productivity. Therefore, proactively managing and renewing these certificates is essential.
Best Practices for IdP Certificate Management
Here are some key considerations for managing your IdP certificates:
In summary: Regular IdP certificate management is crucial for maintaining secure and uninterrupted access to your enterprise systems. By following these best practices, enterprise administrators can minimize the risk of authentication issues and ensure a smooth user experience.
Example of a certificate in Entra IDP:
This can be found in Entra by going to ‘Enterprise Applications’ then finding the GitHub Enterprise Application for the relevant EMU. In that application under the Manage section open the ‘Single Sign-On’ which then lets you see the steps that were taken to setup the EMU IDP connection and on Step 3 for SAML Certificates there is an Edit button that allows you to see the current certificate and with the correct permissions to create a new certificate.
Other IDP’s have their own steps and this was correct at the time of writing in February 2025.
Steps to change the certificate in GitHub Enterprise:
Sign in as the setup user for your enterprise:
Use the username SHORT-CODE_admin, replacing SHORT-CODE with your enterprise's short code. If you need to reset the password for this user, you can contact GitHub Support.
Access the SAML configuration settings:
In the top-right corner of GitHub, click your profile photo.
Click Your enterprise.
In the enterprise account sidebar on the left, click Identity provider.
Under Identity Provider, click Single sign-on configuration.
Edit the SAML configuration:
Under SAML single sign-on, locate your current configuration and click Edit.
Update the Public Certificate field with the new Base64-encoded public certificate from your Identity Provider (IdP). This is the certificate that corresponds to the private key used to sign SAML responses.
Verify the hashing algorithms:
Ensure the Signature Method and Digest Method match the algorithms used by your IdP. Update these if necessary.
Test the new SAML configuration:
Before saving, click Test SAML configuration to ensure the new certificate works correctly. This test uses Service Provider-initiated (SP-initiated) authentication and must succeed before you can save the changes.
Save the updated configuration:
Once the test is successful, click Save SAML settings.
Download recovery codes (optional but recommended):
After saving, download, print, or copy your recovery codes to ensure you can still access your enterprise if your IdP becomes unavailable. For more details, see Downloading your enterprise account's single sign-on recovery codes.
Once the new certificate is active in your IdP, GitHub will use it for SAML authentication. If you encounter any issues during the process, let me know!
Sources
Configuring authentication and provisioning with PingFederate
Configuring SAML single sign-on for Enterprise Managed Users
Configuring SAML single sign-on for your enterprise
GitHub Corporate Terms of Service
Beta Was this translation helpful? Give feedback.
All reactions