You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/actions/writing-workflows/choosing-when-your-workflow-runs/events-that-trigger-workflows.md
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -1033,6 +1033,7 @@ jobs:
1033
1033
> * Scheduled workflows will only run on the default branch.
1034
1034
> * In a public repository, scheduled workflows are automatically disabled when no repository activity has occurred in 60 days. For information on re-enabling a disabled workflow, see [AUTOTITLE](/[email protected]/actions/using-workflows/disabling-and-enabling-a-workflow#enabling-a-workflow).
1035
1035
> * For an enterprise with {% data variables.product.prodname_emus %}, scheduled workflows will not run if the last `actor` associated with the scheduled workflow has been deprovisioned (and therefore become suspended) by the {% data variables.product.prodname_emu %} identity provider (IdP). However, if the last `actor` {% data variables.product.prodname_emu %} has not been deprovisioned by the IdP, and has only been removed as a member from a given organization in the enterprise, scheduled workflows will still run with that user set as the `actor`. Similarly, for an enterprise without {% data variables.product.prodname_emus %}, removing a user from an organization will not prevent scheduled workflows which had that user as their `actor` from running. Essentially, triggering a scheduled workflow requires that the status of the `actor` user account associated with the workflow is currently active (i.e. not suspended or deleted). Thus, the _user account's_ status, in both {% data variables.product.prodname_emu %} and non-{% data variables.product.prodname_emu %} scenarios, is what's important, _not_ the user's _membership status_ in the organization where the scheduled workflow is located.
1036
+
> * Certain repository events change the `actor` associated with the workflow. For example, a user who changes the default branch of the repository, which changes the branch on which scheduled workflows run, becomes `actor` for those scheduled workflows.
1036
1037
> * For a deactivated scheduled workflow, if a user with `write` permissions to the repository makes a commit that changes the `cron` schedule on the workflow, the workflow will be reactivated, and that user will become the `actor` associated with any workflow runs. Note that, in this situation, the workflow is not reactivated by any change to the workflow file; you must alter the `cron` value in the workflow and commit this change.
Copy file name to clipboardExpand all lines: content/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -41,8 +41,8 @@ Before you require use of two-factor authentication, we recommend notifying orga
41
41
{% data reusables.two_fa.ghes_ntp %}
42
42
43
43
> [!WARNING]
44
-
> * When you require two-factor authentication for your enterprise, outside collaborators (including bot accounts) in all organizations owned by your enterprise who do not use 2FA will be removed from the organization and lose access to its repositories. They will also lose access to their forks of the organization's private repositories. You can reinstate their access privileges and settings if they enable 2FA for their account within three months of their removal from your organization. For more information, see [AUTOTITLE](/organizations/managing-membership-in-your-organization/reinstating-a-former-member-of-your-organization).
45
-
> * Any outside collaborator in any of the organizations owned by your enterprise who disables 2FA for their account after you've enabled required two-factor authentication will automatically be removed from the organization. Members and billing managers who disable 2FA will not be able to access organization resources until they re-enable it.
44
+
> * When you require two-factor authentication for your enterprise, {% ifversion ghes < 3.17 %}members and {% endif %}outside collaborators (including bot accounts) in all organizations owned by your enterprise who do not use 2FA will be removed from the organization and lose access to its repositories. They will also lose access to their forks of the organization's private repositories. You can reinstate their access privileges and settings if they enable 2FA for their account within three months of their removal from your organization. For more information, see [AUTOTITLE](/organizations/managing-membership-in-your-organization/reinstating-a-former-member-of-your-organization).
45
+
> * Any {% ifversion ghes < 3.17 %}member or {% endif %}outside collaborator in any of the organizations owned by your enterprise who disables 2FA for their account after you've enabled required two-factor authentication will automatically be removed from the organization. Members {% ifversion fpt or ghes %}and billing managers{% endif %} who disable 2FA will not be able to access organization resources until they re-enable it.
46
46
> * If you're the sole owner of an enterprise that requires two-factor authentication, you won't be able to disable 2FA for your user account without disabling required 2FA for the enterprise.
47
47
48
48
{% ifversion mandatory-2fa-dotcom-contributors %}
@@ -58,7 +58,7 @@ Before you require use of two-factor authentication, we recommend notifying orga
58
58
1. Under "Two-factor authentication", review the information about changing the setting. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %}
59
59
1. Under "Two-factor authentication", select **Require two-factor authentication for the enterprise and all of its organizations**, then click **Save**.
60
60
1. If prompted, read the information about how user access to organization resources will be affected by a 2FA requirement. To confirm the change, click **Confirm**.
61
-
1. Optionally, if any outside collaborators are removed from the organizations owned by your enterprise, we recommend sending them an invitation to reinstate their former privileges and access to your organization. Each person must enable 2FA before they can accept your invitation.
61
+
1. Optionally, if any {% ifversion ghes < 3.17 %}members or {% endif %}outside collaborators are removed from the organizations owned by your enterprise, we recommend sending them an invitation to reinstate their former privileges and access to your organization. Each person must enable 2FA before they can accept your invitation.
Copy file name to clipboardExpand all lines: content/admin/managing-accounts-and-repositories/managing-organizations-in-your-enterprise/requiring-two-factor-authentication-for-an-organization.md
+12-4Lines changed: 12 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -24,16 +24,24 @@ For more information, see [AUTOTITLE](/authentication/securing-your-account-with
24
24
25
25
## Requirements for enforcing two-factor authentication
26
26
27
-
Before you can require organization members and outside collaborators to use 2FA, you must [enable two-factor authentication](/authentication/securing-your-account-with-two-factor-authentication-2fa) for your own personal account.
27
+
Before you can require organization members and outside collaborators to use two-factor authentication, you must [enable 2FA](/authentication/securing-your-account-with-two-factor-authentication-2fa) for your own personal account.
28
28
29
-
Before you require use of two-factor authentication, we recommend notifying organization members and outside collaborators and asking them to set up 2FA for their accounts. You can [see if members and outside collaborators already use 2FA](/organizations/keeping-your-organization-secure/managing-two-factor-authentication-for-your-organization/viewing-whether-users-in-your-organization-have-2fa-enabled) on an organization's People tab.
29
+
Before you require use of 2FA, we recommend notifying organization members and outside collaborators and asking them to set up 2FA for their accounts. You can [see if members and outside collaborators already use 2FA](/organizations/keeping-your-organization-secure/managing-two-factor-authentication-for-your-organization/viewing-whether-users-in-your-organization-have-2fa-enabled) on an organization's People tab.
30
30
31
31
{% data reusables.two_fa.ghes_ntp %}
32
32
33
+
{% ifversion ghes < 3.17 %}
33
34
> [!WARNING]
34
-
> * When you require two-factor authentication, members and outside collaborators (including bot accounts) who do not use 2FA will be removed from the organization and lose access to its repositories, including their forks of private repositories. If they enable 2FA for their personal account within three months of being removed from the organization, you can reinstate their access privileges and settings, see [AUTOTITLE](/organizations/managing-membership-in-your-organization/reinstating-a-former-member-of-your-organization).
35
+
> * When you require 2FA, members and outside collaborators (including bot accounts) who do not use 2FA will be removed from the organization and lose access to its repositories, including their forks of private repositories. If they enable 2FA for their personal account within three months of being removed from the organization, you can reinstate their access privileges and settings, see [AUTOTITLE](/organizations/managing-membership-in-your-organization/reinstating-a-former-member-of-your-organization).
35
36
> * When 2FA is required, organization members or outside collaborators who disable 2FA will automatically be removed from the organization.
36
-
> * If you're the sole owner of an organization that requires two-factor authentication, you won't be able to disable 2FA for your personal account without disabling required two-factor authentication for the organization.
37
+
> * If you're the sole owner of an organization that requires 2FA, you won't be able to disable 2FA for your personal account without disabling required two-factor authentication for the organization.
38
+
{% else %}
39
+
> [!WARNING]
40
+
> * When you require 2FA, members who do not use 2FA will not be able to access your enterprise resources until they enable 2FA on their account. They will retain membership even without 2FA, including occupying seats in your enterprise and organizations.
41
+
> * When your require 2FA, outside collaborators (including bot accounts) who do not use 2FA will be removed from the enterprise and its organization and lose access to repositories, including their forks of private repositories. If they enable 2FA for their personal account within three months of being removed from the organization, you can [reinstate their access privileges and settings](/organizations/managing-membership-in-your-organization/reinstating-a-former-member-of-your-organization).
42
+
> * When 2FA is required, outside collaborators who disable 2FA will automatically be removed from the enterprise and its organizations. Members who disable 2FA will not be able to access your enterprise and organization resources until they re-enable it.
43
+
> * If you're the sole owner of an organization that requires 2FA, you won't be able to disable 2FA for your personal account without disabling required 2FA for the organization.
44
+
{% endif %}
37
45
38
46
## Requiring two-factor authentication for an organization
Copy file name to clipboardExpand all lines: content/admin/managing-accounts-and-repositories/managing-users-in-your-enterprise/viewing-people-in-your-enterprise.md
+18-14Lines changed: 18 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ You can also remove an administrator. For more information. see [AUTOTITLE](/adm
57
57
58
58
You can see all the current members for your enterprise. You can see useful information about each account and filter the list in useful ways, such as by role. In addition to the list of members, you will see an overview of the number of members in your enterprise, grouped by role{% ifversion ghec %}, type of license, and type of deployment{% endif %}.
59
59
60
-
You can find a specific person by searching for the person's username or display name. To view more information about the person's access to your enterprise, such as the organizations the person belongs to, you can click the person's name.
60
+
You can find a specific person by searching for the person's username or display name. To view more information about the person's access to your enterprise, such as the organizations the person belongs to, you can select the person's name.
61
61
62
62
{% ifversion remove-enterprise-members %}
63
63
You can also remove any enterprise member from all organizations owned by the enterprise. For more information, see [AUTOTITLE](/admin/user-management/managing-users-in-your-enterprise/removing-a-member-from-your-enterprise).
@@ -66,7 +66,7 @@ You can also remove any enterprise member from all organizations owned by the en
66
66
{% data reusables.enterprise-accounts.access-enterprise %}
67
67
{% data reusables.enterprise-accounts.people-tab %}
68
68
{% ifversion enterprise-member-csv %}
69
-
1. Optionally, to export the list of members as a CSV report, click**CSV report**. For more information about the information included in the report, see [AUTOTITLE](/admin/user-management/managing-users-in-your-enterprise/exporting-membership-information-for-your-enterprise).{% endif %}
69
+
1. Optionally, to export the list of members as a CSV report, select**CSV report**. For more information about the information included in the report, see [AUTOTITLE](/admin/user-management/managing-users-in-your-enterprise/exporting-membership-information-for-your-enterprise).{% endif %}
70
70
71
71
### About the membership overview
72
72
@@ -130,11 +130,11 @@ If you use {% data variables.product.prodname_emus %}, verify a domain, or confi
130
130
131
131
You can see all the current outside collaborators for your enterprise. You can see useful information about each collaborator and filter the list in useful ways, such as by organization. You can find a specific collaborator by searching for their username or display name.
132
132
133
-
You can view more information about the person's access to your enterprise, such as a list of all the repositories the collaborator has access to, by clicking on the person's name.
133
+
You can view more information about the person's access to your enterprise, such as a list of all the repositories the collaborator has access to, by selecting the person's name.
134
134
135
135
{% data reusables.enterprise-accounts.access-enterprise %}
136
136
{% data reusables.enterprise-accounts.people-tab %}
137
-
1. Under "People", click**Outside collaborators**.
137
+
1. Under "People", select**Outside collaborators**.
138
138
139
139
{% ifversion ghec %}
140
140
@@ -151,11 +151,11 @@ If you use {% data variables.visual_studio.prodname_vss_ghe %}, the list of pend
151
151
152
152
{% data reusables.enterprise-accounts.access-enterprise %}
153
153
{% data reusables.enterprise-accounts.people-tab %}
154
-
1. Under "People", click**Invitations**.
155
-
1. Optionally, you can cancel all invitations for an account to join organizations owned by your enterprise. To the right of the account, click {% octicon "kebab-horizontal" aria-label="Show actions" %}, then click**Cancel invitation**.
154
+
1. Under "People", select**Invitations**.
155
+
1. Optionally, you can cancel all invitations for an account to join organizations owned by your enterprise. To the right of the account, select {% octicon "kebab-horizontal" aria-label="Show actions" %}, then select**Cancel invitation**.
156
156
157
157

158
-
1. Optionally, you can view pending invitations for enterprise administrators or outside collaborators. Under "Invitations", click**Administrators** or **Outside collaborators**.
158
+
1. Optionally, you can view pending invitations for enterprise administrators or outside collaborators. Under "Invitations", select**Administrators** or **Outside collaborators**.
159
159
1. Optionally, to filter the list of pending invitations by license, by organization, or by source, use the dropdown menus at the top of the list.
160
160
161
161

@@ -168,7 +168,7 @@ If your enterprise uses {% ifversion ghec %}{% data variables.product.prodname_e
168
168
169
169
{% data reusables.enterprise-accounts.access-enterprise %}
170
170
{% data reusables.enterprise-accounts.people-tab %}
171
-
1. Under "People", click**Suspended**.
171
+
1. Under "People", select**Suspended**.
172
172
173
173
## Viewing dormant users
174
174
@@ -180,11 +180,11 @@ You can view a list of all dormant users {% ifversion ghes %} who have not been
180
180
181
181
{% data reusables.enterprise-accounts.access-enterprise %}
182
182
1. Under "Organizations", in the search bar, begin typing the organization's name until it appears in the search results.

187
-
1. Above the list of members, click**Type**, then select the type of members you want to view.
187
+
1. Above the list of members, select**Type**, then select the type of members you want to view.
188
188

189
189
190
190
{% ifversion scim-for-ghes-public-beta %}
@@ -210,7 +210,7 @@ You can view a list of members in your enterprise who don't have an email addres
210
210
{% data reusables.enterprise-accounts.access-enterprise %}
211
211
{% data reusables.enterprise-accounts.settings-tab %}
212
212
{% data reusables.enterprise-accounts.verified-domains-tab %}
213
-
1. Under "Notification preferences", click the **{% octicon "eye" aria-hidden="true" %} View enterprise members without an approved or verified domain email** link.
213
+
1. Under "Notification preferences", select the **{% octicon "eye" aria-hidden="true" %} View enterprise members without an approved or verified domain email** link.
214
214
215
215
## Viewing whether members in your enterprise have 2FA enabled
216
216
@@ -220,7 +220,7 @@ You can see which people in your enterprise have enabled two-factor authenticati
220
220
221
221
{% data reusables.enterprise-accounts.access-enterprise %}
222
222
{% data reusables.enterprise-accounts.people-tab %}
223
-
1. To view the two-factor authentication security levels of enterprise members, on the right, select **Two-factor authentication**, then click**Secure**, **Insecure**, or **Disabled**.
223
+
1. To view the two-factor authentication security levels of enterprise members, on the right, select **Two-factor authentication**, then select**Secure**, **Insecure**, or **Disabled**.
224
224
225
225

226
226
@@ -234,9 +234,13 @@ You can see which people in your enterprise have enabled two-factor authenticati
234
234
235
235
{% data reusables.enterprise-accounts.access-enterprise %}
236
236
{% data reusables.enterprise-accounts.people-tab %}
237
-
1. To view enterprise members who have enabled or disabled two-factor authentication, on the right, select **2FA**, then click **Enabled** or **Disabled**.
237
+
1. To view enterprise members who have enabled or disabled two-factor authentication, on the right, select {% ifversion ghes > 3.16 %}**Two-factor authentication**{% else %}**2FA**{% endif %}, then select {% ifversion ghes > 3.16 %}**Secure**{% else %}**Enabled**{% endif %} or **Disabled**.
238
238
239
+
{% ifversion ghes > 3.16 %}
240
+

241
+
{% else %}
239
242

0 commit comments