You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-enterprise-managed-users.md
+2-3Lines changed: 2 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -36,8 +36,6 @@ You can grant {% data variables.product.prodname_managed_users %} access to and
36
36
37
37
The usernames of your enterprise's {% data variables.product.prodname_managed_users %} and their profile information, such as display names and email addresses, are set by through your IdP and cannot be changed by the users themselves. For more information, see "[Usernames and profile information](#usernames-and-profile-information)."
38
38
39
-
{% data reusables.enterprise-accounts.emu-forks %}
40
-
41
39
Enterprise owners can audit all of the {% data variables.product.prodname_managed_users %}' actions on {% data variables.product.prodname_dotcom %}. For more information, see "[Audit log events for your enterprise](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise#about-audit-log-events-for-your-enterprise)."
42
40
43
41
To use {% data variables.product.prodname_emus %}, you need a separate type of enterprise account with {% data variables.product.prodname_emus %} enabled. For more information about creating this account, see "[About enterprises with managed users](#about-enterprises-with-managed-users)."
@@ -75,7 +73,8 @@ To use {% data variables.product.prodname_emus %}, you need a separate type of e
75
73
* {% data variables.product.prodname_managed_users_caps %} cannot create gists or comment on gists.
76
74
* {% data variables.product.prodname_managed_users_caps %} cannot install {% data variables.product.prodname_github_apps %} on their user accounts.
77
75
* Other {% data variables.product.prodname_dotcom %} users cannot see, mention, or invite a {% data variables.product.prodname_managed_user %} to collaborate.
78
-
* {% data variables.product.prodname_managed_users_caps %} can only own private repositories and {% data variables.product.prodname_managed_users %} can only invite other enterprise members to collaborate on their owned repositories.
76
+
* You can choose whether {% data variables.product.prodname_managed_users %} are able to create repositories owned by their user accounts. For more information, see "[Enforcing repository management policies in your enterprise](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-repository-management-policies-in-your-enterprise#enforcing-a-policy-for-repository-creation)."
77
+
* If you allow {% data variables.product.prodname_managed_users %} to create repositories owned by their user accounts, they can only own private repositories and can only invite other enterprise members to collaborate on their user-owned repositories.
79
78
* {% data reusables.enterprise-accounts.emu-forks %}
80
79
* Only private and internal repositories can be created in organizations owned by an {% data variables.product.prodname_emu_enterprise %}, depending on organization and enterprise repository visibility settings.
81
80
* {% data variables.product.prodname_managed_users_caps %} are limited in their use of {% data variables.product.prodname_pages %}. For more information, see "[About {% data variables.product.prodname_pages %}](/pages/getting-started-with-github-pages/about-github-pages#limitations-for-enterprise-managed-users)."
Copy file name to clipboardExpand all lines: content/admin/policies/enforcing-policies-for-your-enterprise/enforcing-repository-management-policies-in-your-enterprise.md
+30-29Lines changed: 30 additions & 29 deletions
Original file line number
Diff line number
Diff line change
@@ -72,58 +72,63 @@ If an enterprise owner disallows members from creating certain types of reposito
72
72
73
73
{% endif %}
74
74
75
-
## Enforcing a policy for {% ifversion ghec or ghes or ghae %}base{% else %}default{% endif %} repository permissions
75
+
## Enforcing a policy for base repository permissions
76
76
77
-
Across all organizations owned by your enterprise, you can set a {% ifversion ghec or ghes or ghae %}base{% else %}default{% endif %} repository permission level (none, read, write, or admin) for organization members, or allow owners to administer the setting on the organization level.
77
+
Across all organizations owned by your enterprise, you can set a base repository permission level (none, read, write, or admin) for organization members, or allow owners to administer the setting on the organization level.
78
78
79
79
{% data reusables.enterprise-accounts.access-enterprise %}
80
80
{% data reusables.enterprise-accounts.policies-tab %}
81
81
{% data reusables.enterprise-accounts.repositories-tab %}
82
-
4. Under "{% ifversion ghec or ghes or ghae %}Base{% else %}Default{% endif %} permissions", review the information about changing the setting. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %}
83
-
5. Under "{% ifversion ghec or ghes or ghae %}Base{% else %}Default{% endif %} permissions", use the drop-down menu and choose a policy.
84
-
{% ifversion ghec or ghes or ghae %}
82
+
4. Under "Base permissions", review the information about changing the setting. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %}
83
+
5. Under "Base permissions", use the drop-down menu and choose a policy.
85
84

86
-
{% else %}
87
-

88
-
{% endif %}
85
+
89
86
90
87
## Enforcing a policy for repository creation
91
88
92
-
Across all organizations owned by your enterprise, you can allow members to create repositories, restrict repository creation to organization owners, or allow owners to administer the setting on the organization level. If you allow members to create repositories, you can choose whether members can create any combination of public, private, and internal repositories. {% data reusables.repositories.internal-repo-default %} For more information about internal repositories, see "[Creating an internal repository](/articles/creating-an-internal-repository)."
89
+
Across all organizations owned by your enterprise, you can allow members to create repositories, restrict repository creation to organization owners, or allow owners to administer the setting on the organization level.
90
+
91
+
If you allow members to create repositories in your organizations, you can choose which types of repositories (public, private, and internal) that members can create.
92
+
93
+
{% ifversion enterprise-namespace-repo-setting %}
94
+
{% ifversion ghec %}If your enterprise uses {% data variables.product.prodname_emus %}, you{% else %}You{% endif %} can also prevent users from creating repositories owned by their user accounts.
95
+
{% endif %}
96
+
97
+
{% data reusables.repositories.internal-repo-default %} For more information about internal repositories, see "[Creating an internal repository](/articles/creating-an-internal-repository)."
93
98
94
99
{% data reusables.organizations.repo-creation-constants %}
95
100
96
101
{% data reusables.enterprise-accounts.access-enterprise %}
97
102
{% data reusables.enterprise-accounts.policies-tab %}
98
103
{% data reusables.enterprise-accounts.repositories-tab %}
99
104
5. Under "Repository creation", review the information about changing the setting. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %}
100
-
{% ifversion ghes or ghae or ghec %}
101
105
{% data reusables.enterprise-accounts.repo-creation-policy %}
102
-
{% data reusables.enterprise-accounts.repo-creation-types %}
103
-
{% else %}
104
-
6. Under "Repository creation", use the drop-down menu and choose a policy.
105
-
106
-

107
-
{% endif %}
106
+
{% data reusables.enterprise-accounts.repo-creation-types %}{% ifversion enterprise-namespace-repo-setting %}
107
+
1. Optionally, {% ifversion ghec %}if your enterprise uses {% data variables.product.prodname_emus %} and you want {% endif %}to prevent enterprise members from creating repositories owned by their user accounts, select **Block the creation of user namespace repositories**.
108
+
{% endif %}
108
109
109
110
## Enforcing a policy for forking private or internal repositories
110
111
111
112
Across all organizations owned by your enterprise, you can allow people with access to a private or internal repository to fork the repository, never allow forking of private or internal repositories, or allow owners to administer the setting on the organization level.
112
113
114
+
{% ifversion enterprise-namespace-repo-setting %}
115
+
{% note %}
116
+
117
+
**Note:** If {% ifversion ghec %}your enterprise uses {% data variables.product.prodname_emus %} and {% endif %}your "Repository creation" policy prevents enterprise members from creating repositories owned by their user accounts, members will not be allowed to fork a repository in their user accounts, regardless of your "Repository forking" policy.
118
+
119
+
{% endnote %}
120
+
{% endif %}
121
+
113
122
{% data reusables.enterprise-accounts.access-enterprise %}
114
123
{% data reusables.enterprise-accounts.policies-tab %}
115
124
{% data reusables.enterprise-accounts.repositories-tab %}
116
125
3. Under "Repository forking", review the information about changing the setting. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %}
117
126
4. Under "Repository forking", use the drop-down menu and choose a policy.
118
127
119
-

120
-
121
-
{% ifversion innersource-fork-policies %}
128
+
{% ifversion innersource-fork-policies %}
122
129
5. If forking is enabled, you can specify where users are allowed to fork repositories. Review the information about changing the setting and choose a policy.
123
130
124
-

125
-
{% endif %}
126
-
131
+
{% endif %}
127
132
128
133
## Enforcing a policy for inviting{% ifversion ghec %} outside{% endif %} collaborators to repositories
129
134
@@ -140,8 +145,6 @@ Across all organizations owned by your enterprise, you can allow members to invi
140
145
{% elsif ghes or ghae %}
141
146

142
147
{% endif %}
143
-
144
-
{% ifversion ghec or ghes or ghae %}
145
148
146
149
## Enforcing a policy for the default branch name
147
150
@@ -156,8 +159,6 @@ Across all organizations owned by your enterprise, you can set the default branc
## Enforcing a policy for changes to repository visibility
162
163
163
164
Across all organizations owned by your enterprise, you can allow members with admin access to change a repository's visibility, restrict repository visibility changes to organization owners, or allow owners to administer the setting on the organization level. When you prevent members from changing repository visibility, only enterprise owners can change the visibility of a repository.
@@ -167,9 +168,9 @@ If an enterprise owner has restricted repository creation to organization owners
167
168
{% data reusables.enterprise-accounts.access-enterprise %}
168
169
{% data reusables.enterprise-accounts.policies-tab %}
169
170
{% data reusables.enterprise-accounts.repositories-tab %}
170
-
5. Under "Repository visibility change", review the information about changing the setting. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %}
171
-
172
-
{% data reusables.enterprise-accounts.repository-visibility-policy %}
171
+
1. Under "Repository visibility change", review the information about changing the setting. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %}
172
+
1. Under "Repository visibility change", use the drop-down menu and choose a policy.
173
+

173
174
174
175
## Enforcing a policy for repository deletion and transfer
0 commit comments