You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/questions/admin/question-006.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,4 +7,4 @@ title: "Question 006"
7
7
-[x] Navigate to your GitHub Enterprise Server instance, select the `Site admin` page, then `Management Console`. Choose `Support` in the top navigation bar and click `Download support bundle`.
8
8
-[x] Generate and download a support bundle directly to your local machine via SSH using the `ghe-support-bundle -o > support-bundle.tgz` CLI command.
9
9
-[ ] First, access the `Settings` in your enterprise account, click on `License`, and under `GitHub Enterprise Help`, select `Upload a support bundle`. This will automatically generate and download the support bundle.
10
-
-[ ] Click your profile, then `Your enterprises`. In the enterprise account sidebar, select `Settings` and under `License`, click `Generate a support bundle`. This will create and download the bundle.
10
+
-[ ] Click your profile, then `Enterprises`. In the enterprise account sidebar, select `Settings` and under `License`, click `Generate a support bundle`. This will create and download the bundle.
1.[x] Benefits include automation of workflows and enhanced functionality; risks include potential security vulnerabilities and dependency on third-party services.
7
9
1.[ ] Benefits are limited to user interface improvements; risks include high costs and increased system complexity.
8
10
1.[ ] The only benefit is the ease of installation; risks involve complete access to codebase and data.
1.[x] Navigate to `Your organizations`, choose`Settings`, click on `Authentication security`, select `Enable SAML authentication`, configure IdP settings, test SAML configuration, and enforce SAML SSO.
8
-
1.[ ]Go to `Organization Settings`, select`Security`, choose `SAML Authentication`, enter IdP information, perform a test of the SAML configuration, and enforce SAML SSO.
9
-
1.[ ] In the main menu, select `Organization`, then `Security Settings`, enable `SAML SSO`, fill in the IdP details, test the SSO configuration, and then enforce SAML SSO.
10
-
1.[ ]Access `Organization Settings`, click`Security`, enable `SAML SSO`, add IdP URL, test the configuration, and opt to enforceSAML SSO upon successful testing.
7
+
1.[x] Navigate to your organization`Settings`, click on `Authentication security`, select `Enable SAML authentication`, configure IdP settings, test SAML configuration, and enforce SAML SSO.
8
+
1.[ ]From `Enterprise account settings`, open`Security`, enable SAML SSO and enforce for all organizations; then configure the IdP. (This manages enterprise-wide SSO, not a single org.)
9
+
1.[ ] In the organization, go to `Settings` → `Member privileges`, enable `SAML SSO`, add IdP metadata, and enforce without testing. (SAML is configured under `Authentication security`, and testing is required.)
10
+
1.[ ]Open the repository’s `Settings`, choose`Security`, enable `SAML SSO`, configure the IdP, and enforce. (SAML SSO is set at the organization level, not per repository.)
0 commit comments