1
0
mirror of synced 2025-12-23 21:07:12 -05:00

Deprecate ghes 3.10 (#54410)

Co-authored-by: Kevin Heis <heiskr@users.noreply.github.com>
This commit is contained in:
Rachael Sewell
2025-02-18 10:37:25 -08:00
committed by GitHub
parent c8caf014e7
commit 9d4d6dc4b0
123 changed files with 90 additions and 891320 deletions

View File

@@ -43,9 +43,7 @@ When subdomain isolation is enabled, {% data variables.product.prodname_ghe_serv
| `http(s)://HOSTNAME/reply/` | `http(s)://reply.HOSTNAME/` |
| `http(s)://HOSTNAME/uploads/` | `http(s)://uploads.HOSTNAME/` |
| `http(s)://HOSTNAME/viewscreen/` | `http(s)://viewscreen.HOSTNAME/` |
| {%- ifversion ghes %} |
| Not supported | `https://containers.HOSTNAME/` |
| {%- endif %} |
## Prerequisites

View File

@@ -23,16 +23,10 @@ redirect_from:
By default, authorized users can access your enterprise's resources from any IP address. You can restrict access to your enterprise's private resources by configuring a list that allows or denies access from specific IP addresses. {% data reusables.identity-and-permissions.ip-allow-lists-example-and-restrictions %}
{% ifversion ghec %}
If your enterprise uses {% data variables.product.prodname_emus %} with Microsoft Entra ID (previously known as Azure AD) and OIDC, you can choose whether to use {% data variables.product.company_short %}'s IP allow list feature or to use the allow list restrictions for your identity provider (IdP). If your enterprise does not use {% data variables.product.prodname_emus %} with Azure and OIDC, you can use {% data variables.product.company_short %}'s allow list feature.
{% endif %}
{% data reusables.identity-and-permissions.ip-allow-lists-which-resources-are-protected %}
{% ifversion ghec %}
## About {% data variables.product.company_short %}'s IP allow list
You can use {% data variables.product.company_short %}'s IP allow list to control access to your enterprise and assets owned by organizations in your enterprise.
@@ -129,8 +123,6 @@ To ensure seamless use of the OIDC CAP while still applying the policy to OAuth
1. Optionally, to allow installed {% data variables.product.company_short %} and {% data variables.product.prodname_oauth_apps %} to access your enterprise from any IP address, select **Skip IdP check for applications**.
1. Click **Save**.
{% endif %}
## Using {% data variables.product.prodname_actions %} with an IP allow list
{% data reusables.actions.ip-allow-list-self-hosted-runners %}