Skip to content

Commit e21e1e0

Browse files
authored
Fix issue with SAML IdP cert expiration note (#57438)
1 parent 87e3802 commit e21e1e0

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

content/admin/managing-iam/using-saml-for-enterprise-iam/configuring-saml-single-sign-on-for-your-enterprise.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,9 @@ For more detailed information about how to enable SAML using Okta, see [AUTOTITL
9999
1. Optionally, in the **Issuer** field, type your SAML issuer URL to verify the authenticity of sent messages.
100100
1. Under **Public Certificate**, paste a certificate to verify SAML responses. This is the public key corresponding to the private key used to sign SAML responses.
101101

102+
> [!NOTE]
103+
> {% data variables.product.github %} does not enforce the expiration of this SAML IdP certificate. This means that even if this certificate expires, your SAML authentication will continue to work. However, if your IdP administrator regenerates the SAML certificate, and you don't update it on the {% data variables.product.github %} side, users will encounter a `digest mismatch` error during SAML authentication attempts due to the certificate mismatch. See [Error: Digest mismatch](/admin/managing-iam/using-saml-for-enterprise-iam/troubleshooting-saml-authentication#error-digest-mismatch).
104+
102105
To find the certificate, refer to the documentation for your IdP. Some IdPs call this an X.509 certificate.
103106

104107
{% data reusables.saml.edit-signature-and-digest-methods %}

0 commit comments

Comments
 (0)