|
| 1 | +--- |
| 2 | +title: Migrating your enterprise to a new identity provider or tenant |
| 3 | +shortTitle: Migrate to new IdP or tenant |
| 4 | +intro: 'You can migrate your enterprise to a different identity provider (IdP) or Azure AD tenant.' |
| 5 | +product: '{% data reusables.gated-features.emus %}' |
| 6 | +versions: |
| 7 | + feature: idp-tenant-migration |
| 8 | +topics: |
| 9 | + - Access management |
| 10 | + - Accounts |
| 11 | + - Administrator |
| 12 | + - Authentication |
| 13 | + - Enterprise |
| 14 | + - SSO |
| 15 | +--- |
| 16 | + |
| 17 | +## About migrations between IdPs and tenants |
| 18 | + |
| 19 | +While using {% data variables.product.prodname_emus %}, you may need to migrate your enterprise to a new IdP or Azure AD tenant. For example, you might be ready to migrate from a test environment to your production environment. |
| 20 | + |
| 21 | +Before you migrate your {% data variables.enterprise.prodname_emu_enterprise %} to a new IdP or tenant, determine whether the values of the normalized SCIM `userName` attribute will remain the same for your {% data variables.enterprise.prodname_managed_users %} in the new environment. For more information about username normalization, see "[Username considerations for external authentication](/admin/identity-and-access-management/managing-iam-for-your-enterprise/username-considerations-for-external-authentication)." |
| 22 | + |
| 23 | +If the normalized SCIM `userName` values will remain the same after the migration, you can complete the migration by yourself. For instructions, see "[Migrating when the normalized SCIM `userName` values will remain the same](#migrating-when-the-normalized-scim-username-values-will-remain-the-same)." |
| 24 | + |
| 25 | +If the normalized SCIM `userName` values will change after the migration, {% data variables.product.company_short %} will need to help with your migration. For more information, see "[Migrating when the normalized SCIM `userName` values will change](#migrating-when-the-normalized-scim-username-values-will-change)." |
| 26 | + |
| 27 | +## Migrating when the normalized SCIM `userName` values will remain the same |
| 28 | + |
| 29 | +To migrate to a new IdP or tenant, you cannot edit your existing SAML configuration. Instead, you must completely deactivate SAML for your enterprise account, then create new SAML and SCIM configurations for the new IdP or tenant. |
| 30 | + |
| 31 | +{% warning %} |
| 32 | + |
| 33 | +**Warning:** Do not remove any users or groups from the application for {% data variables.product.prodname_emus %} in your original IdP or tenant until after your migration is complete. |
| 34 | + |
| 35 | +{% endwarning %} |
| 36 | + |
| 37 | +1. If you don't already have single sign-on recovery codes for your enterprise, download the codes now. For more information, see "[Downloading your enterprise account's single sign-on recovery codes](/admin/identity-and-access-management/managing-recovery-codes-for-your-enterprise/downloading-your-enterprise-accounts-single-sign-on-recovery-codes)." |
| 38 | +1. In your current IdP, deactivate provisioning in the application for {% data variables.product.prodname_emus %}. |
| 39 | + - If you use Azure AD, navigate to the "Provisioning" tab of the application, and then click **Stop provisioning**. |
| 40 | + - If you use Okta, navigate to the "Provisioning" tab of the application, click the **Integration** tab, and then click **Edit**. Deselect **Enable API integration**. |
| 41 | +1. Use a recovery code to sign into {% data variables.product.prodname_dotcom_the_website %} as the setup user, whose username is your enterprise's shortcode suffixed with `_admin`. For more information about the setup user, see "[About {% data variables.product.prodname_emus %}](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-enterprise-managed-users#getting-started-with-enterprise-managed-users)." |
| 42 | + |
| 43 | +1. Deactivate SAML for the {% data variables.enterprise.prodname_emu_enterprise %}. |
| 44 | + - From your profile, click **Your enterprises**, and then click the appropriate enterprise. |
| 45 | + - Click {% octicon "gear" aria-label="The Settings gear" %} **Settings**, and then click **Authentication security**. |
| 46 | + - Under "SAML single sign-on", deselect **Require SAML authentication**, and then click **Save**. |
| 47 | + |
| 48 | +1. Wait for all users in the enterprise to show as suspended. |
| 49 | + |
| 50 | +1. While still signed in as the setup user, configure SAML and SCIM for the new IdP or tenant with a new {% data variables.product.prodname_emus %} application. |
| 51 | + |
| 52 | + After you configure provisioning for the new application, the {% data variables.enterprise.prodname_managed_users %} will be unsuspended, and your developers will be able to sign into their existing accounts again. |
| 53 | + |
| 54 | + By default, this process can take up to 40 minutes for Azure AD. To expedite the process for an individual user, click the **Provision on Demand** button in the "Provisioning" tab of the application for {% data variables.product.prodname_emus %}. |
| 55 | + |
| 56 | +## Migrating when the normalized SCIM `userName` values will change |
| 57 | + |
| 58 | +If the normalized SCIM `userName` values will change, {% data variables.product.company_short %} must provision a new enterprise account for your migration. [Contact our sales team](https://github.com/enterprise/contact) for help. |
0 commit comments