You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Generic configuration options that do not impact the Helm chart are described below.
140
140
141
+
###Disable user and team management via Codefresh UI
142
+
143
+
If you use an external provider, such as Terraform or an IdP (Identity Provider), to provision users and teams, you can disable user/team operations in the Codefresh UI. Blocking user- and team-related operations in the UI means that admins cannot make changes locally that may conflict with or override those via the external provider.
144
+
145
+
These are the operations blocked in the Codefresh UI:
146
+
* Adding/updating/deleting users
147
+
* Adding/updating/deleting teams
148
+
* Defining/updating roles for users
149
+
* Defining/updating SSO provider for users
150
+
151
+
**How to**
152
+
* Enable`disableUserManagement` in Feature management.
141
153
142
154
###Selectively enable SSO provider for account
143
155
Codefresh supports out-of-the-box Git logins with your local username and password, your Git provider, or your SSO provider if SSO is configured.
@@ -240,7 +252,7 @@ cfapi:
240
252
241
253
For detailed information, see the [Securing your webhooks](https://docs.github.com/en/developers/webhooks-and-events/webhooks/securing-your-webhooks) and [Webhooks](https://docs.github.com/en/github-ae@latest/rest/webhooks).
242
254
243
-
### Configure customRoot CA for volumes and containers
255
+
### Configure customcerts for volumes and containers
244
256
Reference the K8s secret containing the root CA in `config.yaml`.
245
257
Define the volume or volumes with the K8s secret objects, and then the volume mounts for the container.