Thoryn

App connectors · App connectors

GitHub Enterprise Cloud — Thoryn as the OIDC IdP

Configure GitHub Enterprise Cloud (with EMU) to authenticate users via Thoryn-issued OIDC tokens.

Tested against:hub: 1.0.0github: EMU 2026

app-connectors recipe — shared category architecture: how this pattern composes with Hub, Broker, and the rest of the catalog

What you get

GitHub Enterprise Managed Users (EMU) authenticated via Thoryn. Users receive a normalised profile with email + given/family name; SCIM provisioning (separate flow) keeps the GitHub side in sync.

Setup

1. In Thoryn

hub clients create \
  --name "GitHub EMU" \
  --redirect-uri "https://github.com/enterprises/YOUR-ENTERPRISE/saml/consume" \
  --grant-types authorization_code \
  --scopes "openid email profile"

2. In GitHub

Enterprise → Settings → Authentication security → Configure OIDC. Fill in:

FieldValue
Issuerhttps://hub.thoryn.org
Client ID(from step 1)
Client Secret(from step 1)

3. Claim mapping

GitHub fieldThoryn claim
emailemail
namegiven_name + family_name
usernamepreferred_username (set this in Hub)

Caveats

  • EMU required: standard GitHub Enterprise Cloud authenticates against the user's existing GitHub.com account. EMU is the only mode that authenticates fully against your IdP.
  • SCIM separate: OIDC handles authentication; GitHub still needs SCIM 2.0 for user lifecycle management. Run both together.

See also