Replies: 3 comments 1 reply
This comment has been minimized.
This comment has been minimized.
-
Dear GitHub Support Team, I am writing to report a serious issue regarding the repository "VAJIRA_MD" (https://github.com/VajiraOfficial/VAJIRA_MD) owned by VajiraOfficial. This repository is hosting code that was originally developed by me and my team, and it has been decrypted and leaked without our permission. Additionally, this repository is being used to threaten others, including me, with repo disablement if we do not comply with certain demands, which is a direct violation of GitHub's terms of service and copyright policies. Here are the details of the issue:
I kindly request that you take immediate action to address this violation by reviewing the repository and taking appropriate measures, including: Removing the repository from GitHub due to the unauthorized use of my code. Taking appropriate action against the repository owner for violating GitHub’s terms of service and intellectual property policies. For your reference, here are some additional details: Vajira MD Repository: https://github.com/VajiraOfficial/VAJIRA_MD Offending Content: Unauthorized code and files that I originally developed. Harassment: The repository owner has been threatening users with repo disablement. Contact Information: WhatsApp: +94768043844 Email: [email protected] I trust GitHub will take the necessary steps to resolve this matter promptly. Thank you for your attention to this issue. Best regards, |
Beta Was this translation helpful? Give feedback.
-
Managing Your Enterprise Identity Provider (IdP) Certificates
Maintaining the security and integrity of your enterprise's identity infrastructure is paramount. One crucial aspect of this is managing your Identity Provider (IdP) certificates. These certificates play a vital role in enabling Single Sign-On (SSO) and ensuring secure authentication for your GitHub Enterprise Managed Users (GHEC EMU) users.
Why is Certificate Management Important?
IdP certificates, like any other digital certificate, have an expiration date. If a certificate expires, users may be unable to log in to your GHEC EMU. This can lead to significant disruptions and impact productivity. Therefore, proactively managing and renewing these certificates is essential.
Best Practices for IdP Certificate Management
Here are some key considerations for managing your IdP certificates:
In summary: Regular IdP certificate management is crucial for maintaining secure and uninterrupted access to your enterprise systems. By following these best practices, enterprise administrators can minimize the risk of authentication issues and ensure a smooth user experience.
Example of a certificate in Entra IDP:
This can be found in Entra by going to ‘Enterprise Applications’ then finding the GitHub Enterprise Application for the relevant EMU. In that application under the Manage section open the ‘Single Sign-On’ which then lets you see the steps that were taken to setup the EMU IDP connection and on Step 3 for SAML Certificates there is an Edit button that allows you to see the current certificate and with the correct permissions to create a new certificate.
Other IDP’s have their own steps and this was correct at the time of writing in February 2025.
Steps to change the certificate in GitHub Enterprise:
Sign in as the setup user for your enterprise:
Use the username SHORT-CODE_admin, replacing SHORT-CODE with your enterprise's short code. If you need to reset the password for this user, you can contact GitHub Support.
Access the SAML configuration settings:
In the top-right corner of GitHub, click your profile photo.
Click Your enterprise.
In the enterprise account sidebar on the left, click Identity provider.
Under Identity Provider, click Single sign-on configuration.
Edit the SAML configuration:
Under SAML single sign-on, locate your current configuration and click Edit.
Update the Public Certificate field with the new Base64-encoded public certificate from your Identity Provider (IdP). This is the certificate that corresponds to the private key used to sign SAML responses.
Verify the hashing algorithms:
Ensure the Signature Method and Digest Method match the algorithms used by your IdP. Update these if necessary.
Test the new SAML configuration:
Before saving, click Test SAML configuration to ensure the new certificate works correctly. This test uses Service Provider-initiated (SP-initiated) authentication and must succeed before you can save the changes.
Save the updated configuration:
Once the test is successful, click Save SAML settings.
Download recovery codes (optional but recommended):
After saving, download, print, or copy your recovery codes to ensure you can still access your enterprise if your IdP becomes unavailable. For more details, see Downloading your enterprise account's single sign-on recovery codes.
Once the new certificate is active in your IdP, GitHub will use it for SAML authentication. If you encounter any issues during the process, let me know!
Sources
Configuring authentication and provisioning with PingFederate
Configuring SAML single sign-on for Enterprise Managed Users
Configuring SAML single sign-on for your enterprise
GitHub Corporate Terms of Service
Beta Was this translation helpful? Give feedback.
All reactions