Skip to content

Commit d315fcb

Browse files
rachaelrenkSiaraMisthpsin
authored
Improve documentation on OIDC for EMU (#49705)
Co-authored-by: Siara <108543037+SiaraMist@users.noreply.github.com> Co-authored-by: Hirsch Singhal <1666363+hpsin@users.noreply.github.com>
1 parent da48a32 commit d315fcb

File tree

3 files changed

+66
-10
lines changed

3 files changed

+66
-10
lines changed

content/admin/identity-and-access-management/configuring-authentication-for-enterprise-managed-users/configuring-oidc-for-enterprise-managed-users.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configuring OIDC for Enterprise Managed Users
33
shortTitle: Configure OIDC
4-
intro: 'You can automatically manage access to your enterprise account on {% data variables.product.prodname_dotcom %} by configuring OpenID Connect (OIDC) single sign-on (SSO) and enable support for your IdP''s Conditional Access Policy (CAP).'
4+
intro: 'Learn how to automatically manage access to your enterprise account on {% data variables.product.prodname_dotcom %} by configuring OpenID Connect (OIDC) single sign-on (SSO) and enabling support for your IdP''s Conditional Access Policy (CAP).'
55
product: '{% data reusables.gated-features.emus %}'
66
versions:
77
feature: oidc-for-emu
@@ -20,15 +20,13 @@ redirect_from:
2020

2121
With {% data variables.product.prodname_emus %}, your enterprise uses your identity provider (IdP) to authenticate all members. You can use OpenID Connect (OIDC) to manage authentication for your {% data variables.enterprise.prodname_emu_enterprise %}. Enabling OIDC SSO is a one-click setup process with certificates managed by {% data variables.product.prodname_dotcom %} and your IdP.
2222

23-
{% data reusables.enterprise-accounts.emu-cap-validates %} For more information, see "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-support-for-your-idps-conditional-access-policy)."
23+
{% data reusables.enterprise-accounts.emu-cap-validates %} See "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-support-for-your-idps-conditional-access-policy)."
2424

25-
You can adjust the lifetime of a session, and how often a {% data variables.enterprise.prodname_managed_user %} needs to reauthenticate with your IdP, by changing the lifetime policy property of the ID tokens issued for {% data variables.product.prodname_dotcom %} from your IdP. The default lifetime is one hour. For more information, see "[Configure token lifetime policies](https://learn.microsoft.com/en-us/azure/active-directory/develop/configure-token-lifetimes)" on Microsoft Learn.
25+
You can adjust the lifetime of a session, and how often a {% data variables.enterprise.prodname_managed_user %} needs to reauthenticate with your IdP, by changing the lifetime policy property of the ID tokens issued for {% data variables.product.prodname_dotcom %} from your IdP. The default lifetime is one hour. See "[Configure token lifetime policies](https://learn.microsoft.com/en-us/entra/identity-platform/configure-token-lifetimes#create-a-policy-and-assign-it-to-a-service-principal)" in the Microsoft documentation.
2626

27-
{% note %}
27+
To change the lifetime policy property, you will need the object ID associated with your {% data variables.product.prodname_emus %} OIDC. See "[AUTOTITLE](/admin/identity-and-access-management/configuring-authentication-for-enterprise-managed-users/finding-the-object-id-for-your-entra-oidc-application)."
2828

29-
**Note:** If you need assistance configuring the OIDC session lifetime, contact [Microsoft Support](https://support.microsoft.com).
30-
31-
{% endnote %}
29+
>[!NOTE] If you need assistance configuring the OIDC session lifetime, contact [Microsoft Support](https://support.microsoft.com).
3230
3331
{% data reusables.enterprise_user_management.SAML-to-OIDC-migration-for-EMU %}
3432

@@ -38,7 +36,7 @@ You can adjust the lifetime of a session, and how often a {% data variables.ente
3836

3937
Support for OIDC is available for customers using Entra ID.
4038

41-
Each Entra ID tenant can support only one OIDC integration with {% data variables.product.prodname_emus %}. If you want to connect Entra ID to more than one enterprise on {% data variables.product.prodname_dotcom %}, use SAML instead. For more information, see "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users)."
39+
Each Entra ID tenant can support only one OIDC integration with {% data variables.product.prodname_emus %}. If you want to connect Entra ID to more than one enterprise on {% data variables.product.prodname_dotcom %}, use SAML instead. See "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-saml-single-sign-on-for-enterprise-managed-users)."
4240

4341
OIDC does not support IdP-initiated authentication.
4442

@@ -56,10 +54,10 @@ OIDC does not support IdP-initiated authentication.
5654

5755
## Enabling provisioning
5856

59-
After you enable OIDC SSO, enable provisioning. For more information, see "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-scim-provisioning-for-enterprise-managed-users)."
57+
After you enable OIDC SSO, enable provisioning. See "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-scim-provisioning-for-enterprise-managed-users)."
6058

6159
## Enabling guest collaborators
6260

6361
You can use the role of guest collaborator to grant limited access to vendors and contractors in your enterprise. Unlike enterprise members, guest collaborators only have access to internal repositories within organizations where they are a member.
6462

65-
To use guest collaborators with OIDC authentication, you may need to update your settings in Entra ID. For more information, see "[AUTOTITLE](/admin/managing-accounts-and-repositories/managing-users-in-your-enterprise/enabling-guest-collaborators)."
63+
To use guest collaborators with OIDC authentication, you may need to update your settings in Entra ID. See "[AUTOTITLE](/admin/managing-accounts-and-repositories/managing-users-in-your-enterprise/enabling-guest-collaborators)."
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
---
2+
title: Finding the object ID for your Entra OIDC application
3+
shortTitle: Find ID for Entra OIDC
4+
intro: 'Learn how to find the object ID associated with your {% data variables.product.prodname_emus %} OIDC app.'
5+
product: '{% data reusables.gated-features.emus %}'
6+
versions:
7+
feature: oidc-for-emu
8+
topics:
9+
- Accounts
10+
- Authentication
11+
- Enterprise
12+
- SSO
13+
---
14+
15+
You can adjust the lifetime of a session, and how often a managed user account needs to reauthenticate with your IdP, by changing the lifetime policy property of the ID tokens issued for {% data variables.product.prodname_dotcom %} from your IdP. The default lifetime is one hour.
16+
17+
You will need the object ID associated with your {% data variables.product.prodname_emus %} OIDC app to complete these steps. You can find this ID in the Microsoft Entra ID admin center or by using the Microsoft Graph Explorer.
18+
19+
Once you have your object ID, you must use the Microsoft Graph API to configure and assign a lifetime policy to that ID token. See "[Configure token lifetime policies](https://learn.microsoft.com/en-us/entra/identity-platform/configure-token-lifetimes#create-a-policy-and-assign-it-to-a-service-principal)" in the Microsoft documentation.
20+
21+
For help completing these steps or configuring the OIDC session lifetime for your IdP, contact [Microsoft Support](https://support.microsoft.com/).
22+
23+
## Using Microsoft Entra ID admin center to find your object ID
24+
25+
You can use the Microsoft Entra ID admin center UI to view the object ID associated with your {% data variables.product.prodname_emus %} OIDC app.
26+
27+
1. Log in to the [Microsoft Entra ID admin center](https://entra.microsoft.com/).
28+
1. In the left sidebar under "Applications", click **Enterprise applications**.
29+
1. Search for the **GitHub Enterprise Managed User (OIDC)** app. The application ID will be `12f6db80-0741-4a7e-b9c5-b85d737b3a31`.
30+
1. Copy the **Object ID** value.
31+
32+
## Using Microsoft Graph Explorer to find your object ID
33+
34+
You can use the [Microsoft Graph Explorer](https://developer.microsoft.com/en-us/graph/graph-explorer) to view the object ID associated with your {% data variables.product.prodname_emus %} OIDC app.
35+
36+
1. Log in to the [Microsoft Graph Explorer](https://developer.microsoft.com/en-us/graph/graph-explorer) tenant that has your OIDC app.
37+
1. To view the object ID (`id` in Microsoft Graph) for your {% data variables.product.prodname_emus %} OIDC app, run the following query.
38+
39+
Request Method: `GET`
40+
41+
URL:
42+
`https://graph.microsoft.com/v1.0/servicePrincipals?$filter=appId eq '12f6db80-0741-4a7e-b9c5-b85d737b3a31'&$select=id,appId,appDisplayName`
43+
44+
Example response:
45+
46+
```json
47+
{
48+
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#servicePrincipals(id,appId,appDisplayName)",
49+
"value": [
50+
{
51+
"id": "c8162c97-32ff-406d-85d3-cc372e3e8384",
52+
"appId": "12f6db80-0741-4a7e-b9c5-b85d737b3a31",
53+
"appDisplayName": "GitHub Enterprise Managed User (OIDC)"
54+
}
55+
]
56+
}
57+
```

content/admin/identity-and-access-management/configuring-authentication-for-enterprise-managed-users/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ topics:
1212
children:
1313
- /configuring-saml-single-sign-on-for-enterprise-managed-users
1414
- /configuring-oidc-for-enterprise-managed-users
15+
- /finding-the-object-id-for-your-entra-oidc-application
1516
- /about-support-for-your-idps-conditional-access-policy
1617
- /disabling-authentication-and-provisioning-for-enterprise-managed-users
1718
---

0 commit comments

Comments
 (0)