API
tryapis.com
Find anything
⌘ K
GitHub API Endpoints
actions
activity
apps
billing
checks
code-scanning
codes-of-conduct
emojis
enterprise-admin
Get GitHub Actions permissions for an enterprise

GET

Set GitHub Actions permissions for an enterprise

PUT

List selected organizations enabled for GitHub Actions in an enterprise

GET

Set selected organizations enabled for GitHub Actions in an enterprise

PUT

Enable a selected organization for GitHub Actions in an enterprise

PUT

Disable a selected organization for GitHub Actions in an enterprise

DELETE

Get allowed actions for an enterprise

GET

Set allowed actions for an enterprise

PUT

List self-hosted runner groups for an enterprise

GET

Create a self-hosted runner group for an enterprise

POST

Get a self-hosted runner group for an enterprise

GET

Update a self-hosted runner group for an enterprise

PATCH

Delete a self-hosted runner group from an enterprise

DELETE

List organization access to a self-hosted runner group in an enterprise

GET

Set organization access for a self-hosted runner group in an enterprise

PUT

Add organization access to a self-hosted runner group in an enterprise

PUT

Remove organization access to a self-hosted runner group in an enterprise

DELETE

List self-hosted runners in a group for an enterprise

GET

Set self-hosted runners in a group for an enterprise

PUT

Add a self-hosted runner to a group for an enterprise

PUT

Remove a self-hosted runner from a group for an enterprise

DELETE

List self-hosted runners for an enterprise

GET

List runner applications for an enterprise

GET

Create a registration token for an enterprise

POST

Create a remove token for an enterprise

POST

Get a self-hosted runner for an enterprise

GET

Delete a self-hosted runner from an enterprise

DELETE

Get the audit log for an enterprise

GET

List provisioned SCIM groups for an enterprise

GET

Provision a SCIM enterprise group and invite users

POST

Get SCIM provisioning information for an enterprise group

GET

Set SCIM information for a provisioned enterprise group

PUT

Update an attribute for a SCIM enterprise group

PATCH

Delete a SCIM group from an enterprise

DELETE

List SCIM provisioned identities for an enterprise

GET

Provision and invite a SCIM enterprise user

POST

Get SCIM provisioning information for an enterprise user

GET

Set SCIM information for a provisioned enterprise user

PUT

Update an attribute for a SCIM enterprise user

PATCH

Delete a SCIM user from an enterprise

DELETE

gists
git
gitignore
interactions
issues
licenses
markdown
meta
migrations
oauth-authorizations
orgs
packages
projects
pulls
rate-limit
reactions
repos
scim
search
secret-scanning
teams
users

GET

https://api.github.com/scim/v2/enterprises/enterprise/Users

Note: The SCIM API endpoints for enterprise accounts are currently in beta and are subject to change.

Retrieves a paginated list of all provisioned enterprise members, including pending invitations.

When a user with a SAML-provisioned external identity leaves (or is removed from) an enterprise, the account's metadata is immediately removed. However, the returned list of user accounts might not always match the organization or enterprise member list you see on GitHub. This can happen in certain cases where an external identity associated with an organization will not match an organization member:

  • When a user with a SCIM-provisioned external identity is removed from an enterprise, the account's metadata is preserved to allow the user to re-join the organization in the future.
  • When inviting a user to join an organization, you can expect to see their external identity in the results before they accept the invitation, or if the invitation is cancelled (or never accepted).
  • When a user is invited over SCIM, an external identity is created that matches with the invitee's email address. However, this identity is only linked to a user account when the user accepts the invitation by going through SAML SSO.

The returned list of external identities can include an entry for a null user. These are unlinked SAML identities that are created when a user goes through the following Single Sign-On (SSO) process but does not sign in to their GitHub account after completing SSO:

  1. The user is granted access by the IdP and is not a member of the GitHub enterprise.

  2. The user attempts to access the GitHub enterprise and initiates the SAML SSO process, and is not currently signed in to their GitHub account.

  3. After successfully authenticating with the SAML SSO IdP, the null external identity entry is created and the user is prompted to sign in to their GitHub account:

    • If the user signs in, their GitHub account is linked to this entry.
    • If the user does not sign in (or does not create a new account when prompted), they are not added to the GitHub enterprise, and the external identity null entry remains in place.

Scopes requested: user, public_repo, repo, notifications, gist
Authorization
tryapis.com never stores your requests or responses