Skip to content

Commit 055c18d

Browse files
authored
Merge pull request #40383 from github/repo-sync
Repo sync
2 parents 09bb55b + 63eaf0b commit 055c18d

File tree

1 file changed

+11
-7
lines changed

1 file changed

+11
-7
lines changed

content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-access-to-githubcom-using-a-corporate-proxy.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,21 @@ versions:
77
ghec: '*'
88
---
99

10-
>[!NOTE] The header for restricting access to {% data variables.product.prodname_dotcom_the_website %} is currently in {% data variables.release-phases.public_preview %} and subject to change. Although preview releases are not typically supported by {% data variables.product.company_short %} Support (see [AUTOTITLE](/get-started/using-github/exploring-early-access-releases-with-feature-preview#githubs-release-cycle)), this feature is supported by {% data variables.product.company_short %} Support while in {% data variables.release-phases.public_preview %}.
11-
1210
If you use {% data variables.product.prodname_emus %}, you can block users on your network from authenticating to {% data variables.product.prodname_dotcom_the_website %} with accounts that are not members of your enterprise. This helps reduce the risk of your company's data being exposed to the public.
1311

1412
To enforce this restriction, you will configure your network proxy or firewall to inject a header into your users' web and API requests to {% data variables.product.prodname_dotcom_the_website %}.
1513

1614
This feature requires an external firewall or proxy. {% data variables.contact.github_support %} cannot assist with setup or troubleshooting for external tools such as these. For more about scope of support, see [AUTOTITLE](/support/learning-about-github-support/about-github-support#scope-of-support).
1715

18-
## Requesting access
16+
## Enabling access restrictions
17+
18+
This feature is not enabled by default. An enterprise owner can enable the feature for your enterprise.
19+
20+
{% data reusables.enterprise-accounts.access-enterprise-emu %}
21+
{% data reusables.enterprise-accounts.settings-tab %}
22+
1. Under {% octicon "gear" aria-hidden="true" aria-label="gear" %} **Settings**, click **Authentication security**.
23+
1. In the "Enterprise access restrictions" section, select **Enable enterprise access restrictions**.
1924

20-
This feature is not enabled by default. To request access, contact your account manager in {% data variables.product.github %}'s Sales team or [sign up here](https://github.com/features/preview/enterprise-access-restrictions).
2125

2226
## Prerequisites
2327

@@ -27,7 +31,7 @@ This feature is not enabled by default. To request access, contact your account
2731
* To enforce the restriction, all traffic must flow through a proxy or firewall. The proxy or firewall must:
2832
* Be capable of intercepting and editing traffic, commonly called a "break and inspect" proxy
2933
* Support arbitrary header injection
30-
* {% data variables.product.company_short %} must have granted you access to this feature.
34+
* Your enterprise owner has enabled this feature.
3135

3236
## Finding the header
3337

@@ -42,8 +46,8 @@ An enterprise owner can identify the correct enterprise ID to use in the header
4246
{% data reusables.enterprise-accounts.access-enterprise-emu %}
4347
{% data reusables.enterprise-accounts.settings-tab %}
4448
1. Under {% octicon "gear" aria-hidden="true" aria-label="gear" %} **Settings**, click **Authentication security**.
45-
1. In the "Enterprise access restrictions" section, find the header for your enterprise. This section is only visible for enterprises with the feature enabled.
46-
49+
1. In the "Enterprise access restrictions" section, find the header for your enterprise.
50+
4751
## Using the header
4852

4953
For best results, configure your proxy to inject the header into all traffic to the following **supported endpoints**.

0 commit comments

Comments
 (0)