131 lines
11 KiB
Markdown
131 lines
11 KiB
Markdown
---
|
|
title: Initializing GitHub AE
|
|
intro: 'To get your enterprise ready to use, you can complete the initial configuration of {% data variables.product.product_name %}.'
|
|
versions:
|
|
ghae: '*'
|
|
type: how_to
|
|
topics:
|
|
- Enterprise
|
|
redirect_from:
|
|
- /admin/configuration/initializing-github-ae
|
|
---
|
|
## About initialization
|
|
|
|
Before you can initialize your enterprise, you must purchase {% data variables.product.product_name %}. For more information, contact {% data variables.contact.contact_enterprise_sales %}.
|
|
|
|
{% data reusables.github-ae.initialize-enterprise %} Make sure the information you provide matches the intended enterprise owner's information in the IdP. For more information about enterprise owners, see "[Roles in an enterprise](/github/setting-up-and-managing-your-enterprise/roles-in-an-enterprise#enterprise-owner)."
|
|
|
|
{% note %}
|
|
|
|
**Notes**:
|
|
|
|
- If the initial password for {% data variables.product.prodname_ghe_managed %} expires before you finish initialization, you can request a password reset at any time from your invitation email.
|
|
|
|
- Store the initial username and password for {% data variables.product.prodname_ghe_managed %} securely in a password manager. {% data reusables.saml.contact-support-if-your-idp-is-unavailable %}
|
|
|
|
{% endnote %}
|
|
|
|
During initialization, the enterprise owner will name your enterprise, configure SAML SSO, create policies for all organizations in your enterprise, and configure a support contact for your users.
|
|
|
|
## Prerequisites
|
|
|
|
To begin initialization, you will receive an invitation email from {% data variables.product.company_short %}. Before you configure {% data variables.product.prodname_ghe_managed %}, review the following prerequisites.
|
|
|
|
|
|
1. To initialize {% data variables.product.product_location %}, you must have a SAML identity provider (IdP). {% data reusables.saml.ae-uses-saml-sso %} To connect your IdP to your enterprise during initialization, you should have your IdP's Entity ID (SSO) URL, Issuer ID URL, and public signing certificate (Base64-encoded). For more information, see "[About identity and access management for your enterprise](/admin/authentication/about-identity-and-access-management-for-your-enterprise)."
|
|
|
|
{% note %}
|
|
|
|
**Note**: {% data reusables.saml.create-a-machine-user %}
|
|
|
|
{% endnote %}
|
|
|
|
2. {% data reusables.saml.assert-the-administrator-attribute %}
|
|
|
|
## Signing in and naming your enterprise
|
|
|
|
1. Follow the instructions in your welcome email to reach your enterprise.
|
|
2. Type your credentials under "Change password", then click **Change password**.
|
|
3. Under "What would you like your enterprise account to be named?", type the enterprise's name, then click **Save and continue**.
|
|

|
|
|
|
## Connecting your IdP to your enterprise
|
|
|
|
To configure authentication for {% data variables.product.product_name %}, you must provide {% data variables.product.product_name %} with the details for your SAML IdP. {% data variables.product.company_short %} recommends using Azure AD as your IdP. For more information, see "[Configuring authentication and provisioning with your identity provider](/admin/authentication/configuring-authentication-and-provisioning-with-your-identity-provider)."
|
|
|
|
1. To the right of "Set up your identity provider", click **Configure**.
|
|

|
|
1. Under "Sign on URL", copy and paste the URL for your SAML IdP.
|
|

|
|
1. Under "Issuer", copy and paste the issuer URL for your SAML IdP.
|
|

|
|
1. Under "Public certificate", copy and paste the public certificate for your SAML IdP.
|
|

|
|
1. Click **Test SAML configuration** to ensure that the information you've entered is correct.
|
|

|
|
1. Click **Save**.
|
|

|
|
|
|
## Setting your enterprise policies
|
|
|
|
Configuring policies will set limitations for repository and organization management for your enterprise. These can be reconfigured after the initialization process.
|
|
|
|
1. To the right of "Set your enterprise policies", click **Configure**.
|
|

|
|
2. Under "Default Repository Permissions", use the drop-down menu and click a default permissions level for repositories in your enterprise. If a person has multiple avenues of access to an organization, either individually, through a team, or as an organization member, the highest permission level overrides any lower permission levels. Optionally, to allow organizations within your enterprise to set their default repository permissions, click **No policy**
|
|

|
|
3. Under "Repository creation", choose whether you want to allow members to create repositories. Optionally, to allow organizations within your enterprise to set permissions, click **No policy**.
|
|

|
|
4. Under "Repository forking", choose whether to allow forking of private and internal repositories. Optionally, to allow organizations within your enterprise to set permissions, click **No policy**
|
|

|
|
5. Under "Repository invitations", choose whether members or organization owners can invite collaborators to repositories. Optionally, to allow organizations within your enterprise to set permissions, click **No policy**
|
|

|
|
6. Under "Default repository visibility", use the drop-down menu and click the default visibility setting for new repositories.
|
|

|
|
7. Under "Users can create organizations", use the drop-down menu to enable or disable organization creation access for members of the enterprise.
|
|

|
|
8. Under "Force pushes", use the drop-down menu and choose whether to allow or block force pushes.
|
|

|
|
9. Under "Git SSH access", use the drop-down menu and choose whether to enable Git SSH access for all repositories in the enterprise.
|
|

|
|
10. Click **Save**
|
|

|
|
11. Optionally, to reset all selections, click "Reset to default policies".
|
|

|
|
|
|
## Setting your internal support contact
|
|
|
|
You can configure the method your users will use to contact your internal support team. This can be reconfigured after the initialization process.
|
|
|
|
1. To the right of "Internal support contact", click **Configure**.
|
|

|
|
2. Under "Internal support contact", select the method for users of your enterprise to contact support, through a URL or an e-mail address. Then, type the support contact information.
|
|

|
|
3. Click **Save**.
|
|

|
|
|
|
## Setting your email settings
|
|
|
|
Once this is initialized, you can reconfigure any settings after the initialization process. For more information, see "[Configuring email for notifications](/admin/configuration/configuring-email-for-notifications)."
|
|
|
|
1. To the right of "Configure email settings", click **Configure**.
|
|

|
|
2. Select **Enable email**. This will enable both outbound and inbound email, however, for inbound email to work you will also need to configure your DNS settings. For more information, see "[Configuring DNS and firewall
|
|
settings to allow incoming emails](/admin/configuration/configuring-email-for-notifications#configuring-dns-and-firewall-settings-to-allow-incoming-emails)."
|
|

|
|
3. Complete your email server settings:
|
|
- In the **Server address** field, type the address of your SMTP server.
|
|
- In the **Port** field, type the port that your SMTP server uses to send email.
|
|
- In the **Domain** field, type the domain name that your SMTP server will send with a HELO response, if any.
|
|
- In the **Authentication** dropdown, choose the type of encryption used by your SMTP server.
|
|
- In the **No-reply email address** field, type the email address to use in the From and To fields for all notification emails.
|
|
|
|
4. If you want to discard all incoming emails that are addressed to the no-reply email address, select **Discard email addressed to the no-reply email address**.
|
|

|
|
5. Click **Test email settings**.
|
|

|
|
6. Under "Send test email to," type the email address where you want to send a test email, then click **Send test email**.
|
|

|
|
7. Click **Save**.
|
|

|