Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit25c7ba8

Browse files
committed
Update sso topics
1 parent2c0ffe9 commit25c7ba8

File tree

17 files changed

+97
-101
lines changed

17 files changed

+97
-101
lines changed

‎_data/home-content.yml‎

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -210,19 +210,11 @@
210210

211211

212212

213-
-title:Clients
214-
icon:images/home-icons/client.svg
215-
url:''
216-
links:
217-
-title:Codefresh CLI
218-
localurl:/docs/clients/csdp-cli/
219-
220-
221213
-title:Installation
222214
icon:images/home-icons/runtimes.svg
223215
url:''
224216
links:
225-
-title:Installationenvironments
217+
-title:Installationoptions
226218
localurl:/docs/installation/installation-options/
227219
-title:Codefresh Runner installation
228220
localurl:/docs/installation/codefresh-runner/

‎_data/nav.yml‎

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -530,6 +530,7 @@
530530
url:"/user-settings"
531531
-title:Managing Git PATs
532532
url:"/manage-pats"
533+
533534

534535
-title:Single Sign-On
535536
url:/single-sign-on
@@ -558,10 +559,12 @@
558559
url:/saml-jumpcloud
559560
-title:Okta
560561
url:/saml-okta
562+
-title:Google
563+
url:/oidc-google
561564
-title:OneLogin
562565
url:/saml-onelogin
563566
-title:PingID SSO
564-
url:"/saml-pingid"
567+
url:/saml-pingid
565568
-title:LDAP
566569
url:/ldap
567570

‎_docs/quick-start/ci-quickstart/create-ci-pipeline.md‎

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title:"Pipeline quick start"
33
description:"Quick start to set up a continuous integration (CI) pipeline"
44
group:quick-start
5+
sub_group:ci-quickstart
56
toc:true
67
---
78

‎_docs/single-sign-on/ldap.md‎

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,8 @@ To configure SSO for LDAP in Codefresh, you need to first create a user on your
1212
this user is an LDAP admin.
1313
Make sure also that you know the scope of the search, that is, where users to search for are located in the LDAP hierarchy.
1414

15-
1. In the Codefresh UI, go to[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
15+
1. In the Codefresh UI, from the toolbar click the**Settings** icon.
16+
1. In the sidebar, from Access & Collaboration, select[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
1617
1. Select**+ Add Single Sign-On**,**LDAP**, and then**Next**.
1718

1819
{% include image.html

‎_docs/single-sign-on/oidc.md‎

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ group: single-sign-on
55
toc:true
66
---
77

8-
Codefresh natively supports loginusing GitHub, Bitbucket and GitLab using the OpenID Connect (OAuth2) protocol.
8+
Codefresh natively supports loginwith GitHub, Bitbucket and GitLab, using the OpenID Connect (OAuth2) protocol.
99

1010

1111
##Prerequisites
@@ -35,9 +35,9 @@ Here's what you need to do to configure SSO via OIDC in Codefresh:
3535
1. Test integration with the IdP:
3636

3737
>Before enabling SSO for users in Codefresh, you**MUST** make sure that it is working for the test user.
38-
When SSO is enabled for a user, Codefresh allows login only through the SSOfor the userand blocks logins through other IdPs. If the selected SSO method does not work for some reason, the is locked out of Codefresh.
38+
When SSO is enabled for a user, Codefresh allows login only through the SSO and blocks logins through other IdPs. If the selected SSO method does not work for some reason, the user is locked out of Codefresh.
3939

40-
1. In the Codefresh UI, on the toolbar,click the**Settings** icon and then select**Account Settings**.
40+
1. In the Codefresh UI, on the toolbar,from your avatar dropdown, select**Account Settings**.
4141
1. In the sidebar, from Access & Collaboration, select[**Users & Teams**](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
4242
1. Add an active user to be used for testing. We recommend you use your own user.
4343
1. From the**SSO** dropdown, select the provider you want to test.
@@ -52,11 +52,11 @@ Here's what you need to do to configure SSO via OIDC in Codefresh:
5252
max-width="50%"
5353
%}
5454

55-
{:start="2"}
56-
1. (Optional)[Setan IdP as the default provider]({{site.baseurl}}/docs/single-sign-on/team-sync/#set-a-default-sso-provider-for-account)
55+
{:start=""}
56+
1. (Optional)[Seta default SSO provider for account]({{site.baseurl}}/docs/single-sign-on/team-sync/#set-a-default-sso-provider-for-account)
5757
You can select an IdP as the default SSO provider for a Codefresh account. This means that all the new users added to that account will automatically use the selected IdP for signin.
58-
1. (Optional)[Set theSSO method foreach user]({{site.baseurl}}/docs/single-sign-on/team-sync/#select-sso-method-for-individual-users)
59-
You can also select if needed, a different SSO provider forevery user or forspecific users.
58+
1. (Optional)[SelectSSO method forindividual users]({{site.baseurl}}/docs/single-sign-on/team-sync/#select-sso-method-for-individual-users)
59+
You can also select if needed, a different SSO provider for specific users.
6060

6161
>Codefresh has an internal cache for SSO configuration, and it can take up to five minutes for your changes to take effect.
6262

‎_docs/single-sign-on/oidc/oidc-auth0.md‎

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title:"Auth0"
3-
description:"Set up Auth0Single Sign-On (SSO)"
2+
title:"Auth0 SSO via OIDC"
3+
description:"Set up Auth0SSO for OIDC"
44
group:single-sign-on
55
sub_group:oidc
66
redirect_from:
@@ -10,7 +10,7 @@ toc: true
1010
---
1111

1212
Set up SSO for Auth0 using OIDC.
13-
Auth0 is one of the SSO providers that Codefresh supports for authentication and authorization.
13+
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({{site.baseurl}}/docs/single-sign-on/oidc).
1414

1515
Set up OIDC SSO for Auth0 in Codefresh by:
1616
1. Creating an Auth0 application in Auth0
@@ -57,7 +57,8 @@ max-width="40%"
5757
##Step 2: Create SSO account for Auth0 in Codefresh
5858
After creating an Auth0 application, create an SSO account for OAuth0 in Codefresh.
5959

60-
1. In the Codefresh UI, go to[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
60+
1. In the Codefresh UI, from the toolbar click the**Settings** icon.
61+
1. In the sidebar, from Access & Collaboration, select[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
6162
1. Click**Add Single Sign-On**.
6263
1. For the Single Sign-On Service, select**Auth0**, and click**Next**.
6364
1. Define the connection details:
@@ -84,7 +85,7 @@ max-width="40%"
8485

8586

8687
##Step 3: Define SSO settings in Auth0 application
87-
As the final step in Auth0 SSO setup, return to Auth0, and then define the Login URI and Callback URL for the Auth0 application you created in 1.
88+
As the final step in Auth0 SSO setup, return to Auth0, and then define the Login URI and Callback URL for the Auth0 application you created inStep1.
8889

8990
1. From the sidebar, select**Applications > Applications**.
9091
1. In the**Application Login URL** field, enter`https://g.codefresh.io/login`.
@@ -112,3 +113,4 @@ You have completed SSO setup for Auth0 in Codefresh.
112113

113114

114115

116+

‎_docs/single-sign-on/oidc/oidc-azure.md‎

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title:"AzureSingle Sign-On (SSO)"
3-
description:""
2+
title:"AzureSSO via OIDC"
3+
description:"Set up Azure SSO for OIDC"
44
group:single-sign-on
55
sub_group:oidc
66
redirect_from:
@@ -9,7 +9,7 @@ toc: true
99
---
1010

1111
Set up SSO for Azure using OIDC.
12-
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({site.baseurl}}/docs/single-sign-on/oidc).
12+
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({{site.baseurl}}/docs/single-sign-on/oidc).
1313

1414
Set up OIDC SSO for Azure in Codefresh by:
1515
1. Registering the Codefresh application in Azure
@@ -143,7 +143,7 @@ max-width="70%"
143143
{:start="3"}
144144
1. Click**Add**.
145145
**Copy the secret key**, as you will need to provide it on setting up Azure SSO in Codefresh.
146-
1. Continue with[Step 4: Configure SSOsettinggs for Azure in Codefresh](#step-4-configure-sso-settings-for-azure-in-codefresh).
146+
1. Continue with[Step 4: Configure SSOsettings for Azure in Codefresh](#step-4-configure-sso-settings-for-azure-in-codefresh).
147147

148148
##Step 4: Configure SSO settings for Azure in Codefresh
149149

@@ -166,7 +166,8 @@ max-width="70%"
166166

167167
**How to**
168168

169-
1. In the Codefresh UI, select**Account Settings**, and then from the sidebar, select**Single Sign On**.
169+
1. In the Codefresh UI, from the toolbar click the**Settings** icon.
170+
1. In the sidebar, from Access & Collaboration, select[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
170171
1. Click**Add Single Sign-On**, and select**Azure AD**.
171172
1. Enter the following:
172173
***Client Name**: For auto-generation, leave empty. Codefresh generates the client name once you save the settings.
@@ -245,14 +246,7 @@ max-width="70%"
245246

246247
You have now completed the SSO setup for Azure using OIDC.
247248

248-
##Test SSO Connection
249249

250-
Now test the SSO with a test user in a different browser or private/incognito browser to make sure the integration works as it should.
251-
252-
1. In the Codefresh UI, on the toolbar, click the**Settings** icon and then select**Account Settings**.
253-
1. From the sidebar, below Access & Collaboration, select[**Users & Teams**](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
254-
1. Locate a test user, and from the SSO list, select the integration name to enable SSO for that user.
255-
1. In a different browser or private/incognito browser window use the Corporate option to log in.
256250

257251
##Related articles
258252
[Federated Single Sign-On (SSO) overview]({{site.baseurl}}/docs/single-sign-on/)

‎_docs/single-sign-on/oidc/oidc-google.md‎

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title:"GoogleSingle Sign-On (SSO)"
3-
description:""
2+
title:"GoogleSSO via OIDC"
3+
description:"Set up Google SSO for OIDC"
44
group:single-sign-on
55
sub_group:oidc
66
toc:true
77
---
88

99
Set up SSO for Google using OIDC.
10-
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({site.baseurl}}/docs/single-sign-on/oidc).
10+
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({{site.baseurl}}/docs/single-sign-on/oidc).
1111

1212
Set up OIDC SSO for Google in Codefresh by:
1313
1. Creating the client secret in Google
@@ -53,7 +53,8 @@ Set up OIDC SSO for Google in Codefresh by:
5353

5454
##Step 2: Configure SSO settings for Google in Codefresh
5555

56-
1. In the Codefresh UI, go to[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
56+
1. In the Codefresh UI, from the toolbar click the**Settings** icon.
57+
1. In the sidebar, from Access & Collaboration, select[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
5758
1. Select**+ Add Single Sign-On**,**Google**, and then**Next**.
5859

5960

‎_docs/single-sign-on/oidc/oidc-okta.md‎

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title:"OktaSingle Sign-On (SSO)"
3-
description:""
2+
title:"OktaSSO via OIDC"
3+
description:"Set up Okta SSO for OIDC"
44
group:single-sign-on
55
sub_group:oidc
66
redirect_from:
77
-/docs/enterprise/single-sign-on/sso-okta/
88
toc:true
99
---
1010
Set up SSO for Okta using OIDC.
11-
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({site.baseurl}}/docs/single-sign-on/oidc).
11+
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({{site.baseurl}}/docs/single-sign-on/oidc).
1212

1313

1414
Set up OIDC SSO for Okta in Codefresh by:
@@ -121,7 +121,8 @@ max-width="70%"
121121

122122
###Configure SSO for Okta in Codefresh
123123

124-
1. In the Codefresh UI, go to[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
124+
1. In the Codefresh UI, from the toolbar click the**Settings** icon.
125+
1. In the sidebar, from Access & Collaboration, select[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
125126
1. Select**+ Add Single Sign-On** and then select**Okta**.
126127

127128
{% include image.html

‎_docs/single-sign-on/oidc/oidc-onelogin.md‎

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title:"OneLoginSingle Sign-On (SSO)"
3-
description:""
2+
title:"OneLoginSSO via OIDC"
3+
description:"Set up OneLogin SSO for OIDC"
44
group:single-sign-on
55
sub_group:oidc
66
redirect_from:
@@ -9,7 +9,7 @@ toc: true
99
---
1010

1111
Set up SSO for OneLogin using OIDC.
12-
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({site.baseurl}}/docs/single-sign-on/oidc).
12+
For a general overview on OIDC, see[Setting up OIDC Federated SSO]({{site.baseurl}}/docs/single-sign-on/oidc).
1313

1414
Set up OIDC SSO for OneLogin in Codefresh by:
1515
1. Setting up OneLogin as an IdP
@@ -72,7 +72,8 @@ Configure the application in the OneLogin dashboard.
7272

7373
##Step 2: Configure SSO for OneLogin in Codefresh
7474

75-
1. In the Codefresh UI, go to[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
75+
1. In the Codefresh UI, from the toolbar click the**Settings** icon.
76+
1. In the sidebar, from Access & Collaboration, select[Single Sign-On](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
7677
1. Select**+ Add Single Sign-On** and then select**OneLogin**.
7778

7879
{% include image.html

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp