To integrate the SecSign ID Two-Factor Authentication with GitHub you first need to setup an account with GitHub and have administrative access rights. More information about setting up an account and managing user rights are available on the GitHub website.
You also need access to the SecSign ID administrative panel. If you need assistance managing your administrative account please contact us.
Navigate to your companies GitHub SAML single-sign on setup page and check “Enable SAML authentication.
Your Sign-On URL is https://
For example: https://admin.secsign.com/SAML_Login
The corresponding issuer is identical to the Sign-On URL.
Leave the GitHub single-sign on page open and navigate to the SecSign ID administration page and choose user group. Select the user who is set to sign SAML responses in this group. Copy the PEM encoded certificate of the user in the GitHub single-sign on setup page at “Public certificate”.
Choose RSA_SHA256 as signature method and SHA-256 as digest method and save the settings.
Copy the displayed Assertion Consumer Service (ACS) URL for the SecSign ID Server configuration.
Example: https://github.com/orgs/SecSignDemo/saml/consume
Select “Save your recovery codes” and secure those codes in a secure place.
Navigate to the “New SAML service provider tab” on your GitHub settings page and add the following parameters:
Name (example): GitHub
NameID Attribute store: SecSign ID Server
NameID source attribute: SecSign ID
This determines that the SecSign ID user name shall be identical to the GitHub Enterprise username. Alternatively, the SecSign ID server can be configured to look up the Git Hub Enterprise username at an LDAP server, for example in a Windows Active Directory.
Format: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
Service Provider Issuer: https://github.com/orgs/
Example: https://github.com/orgs/SecSignDemo
SAML response URL: The assertion consumer service (ACS) URL displayed in GitHub’s SAML single sign-on settings page of your organization, for example: https://github.com/orgs/SecSignDemo/saml/consume.
Please leave RelayState, Audience Restriction and Auth Context blank.
User group to sign: The user group to which you have assigned a
technical user owning the private key to sign SAML responses. Example user group name: “SAML response signers.”
Hash algorithm: SHA-256.
PSS padding: off
SAML attribute: GitHub requires at least one attribute to be present.
Select for example secSignID (http://schemas.xmlsoap.org/claims/CommonName).
We provide an ever growing list of APIs and plugins to easily integrate the SecSign ID Two-Factor Authentication in any project. An overview is available at Plugin and APIs.
We do not only offer APIs in different programming languages but also plugins for CMS, Server and VPN environments, oAuth2 and many more. These plugins use our APIs and offer additional functionalities, for example user management, easy and native installation, logging or integration in firewalls or Active Directory.
The JIRA plugin for example uses the JAVA-API. The PHP-Api and JS-API is used by WordPress, Joomla, Drupal, Typo3 and many more. The ASP.net/C#-API is used for the Windows and Cisco VPN and the C-API is used for protecting Unix SSH services. The Objective-C API is used by our AppleTV and iPhone/iPad apps.
You can experience the SecSign ID two-factor authentication and the two-factor login by simply integrating the plugin into your website or test environment. Or you can try out the login process on our website without having to register first. You already have a SecSign ID or you want one? Login now and use the portal or use our hassle free registration.
See for yourself how fast and convenient the login process using challenge-response authentication with 2048-bit key pairs is. There is no need for passwords, and no passwords or other confidential information are ever transmitted. It is easy to integrate and simple to use.
For more information about the patented SafeKey procedure and it's unique security can be found here.
If you are missing an API for the programming language you are working with, feel free to contact us and we’ll find a solution with you. If you need help with the integration into an existing system or you can’t find the plugin for your content management system you are working with, don’t hesitate to contact our support team.
On premise installations of SecSign ID offer the flexibility to connect with your preferred servers, services, and devices. And you can customize the SecSign ID with your own organization’s branding.
Choose between our SecSign ID Cloud or operate your own on-premise Two-Factor Authentication server.
Operate your own YourBrand ID app - Two-Factor Authentication customized to your needs.
Integrate SecSign ID Two-Factor Authentication in existing apps with our ready-to-use SDK.
Use the Two-Factor Authentication Server to secure your company Active Directory/LDAP. Your own Identity and Access Management System, for example for mandatory updates and additional security features.
Integration in any login environment: web, local, VPN, remote desktop, mobile logins and many more.
No need for complex integration: we have plugins for almost all environments.
Want to learn more about SecSign’s innovative and highly secure
solutions for protecting your user accounts and sensitive data?
Use our contact form to submit your information, and a SecSign sales representative will contact you within one business day.
If you need assistance with an existing SecSign account or product
installation, please see the FAQs for more information on the most common questions. You don’t find the solution to your problem? Don’t hesitate to contact the
Product Support
I am Interested in