You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _docs/single-sign-on/oidc.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ group: single-sign-on
5
5
toc:true
6
6
---
7
7
8
-
Codefresh natively supports loginusing GitHub, Bitbucket and GitLab using the OpenID Connect (OAuth2) protocol.
8
+
Codefresh natively supports loginwith GitHub, Bitbucket and GitLab, using the OpenID Connect (OAuth2) protocol.
9
9
10
10
11
11
##Prerequisites
@@ -35,9 +35,9 @@ Here's what you need to do to configure SSO via OIDC in Codefresh:
35
35
1. Test integration with the IdP:
36
36
37
37
>Before enabling SSO for users in Codefresh, you**MUST** make sure that it is working for the test user.
38
-
When SSO is enabled for a user, Codefresh allows login only through the SSOfor the userand blocks logins through other IdPs. If the selected SSO method does not work for some reason, the is locked out of Codefresh.
38
+
When SSO is enabled for a user, Codefresh allows login only through the SSO and blocks logins through other IdPs. If the selected SSO method does not work for some reason, the user is locked out of Codefresh.
39
39
40
-
1. In the Codefresh UI, on the toolbar,click the**Settings** icon and then select**Account Settings**.
40
+
1. In the Codefresh UI, on the toolbar,from your avatar dropdown, select**Account Settings**.
41
41
1. In the sidebar, from Access & Collaboration, select[**Users & Teams**](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
42
42
1. Add an active user to be used for testing. We recommend you use your own user.
43
43
1. From the**SSO** dropdown, select the provider you want to test.
@@ -52,11 +52,11 @@ Here's what you need to do to configure SSO via OIDC in Codefresh:
52
52
max-width="50%"
53
53
%}
54
54
55
-
{:start="2"}
56
-
1. (Optional)[Setan IdP as the default provider]({{site.baseurl}}/docs/single-sign-on/team-sync/#set-a-default-sso-provider-for-account)
55
+
{:start="3ß"}
56
+
1. (Optional)[Seta default SSO provider for account]({{site.baseurl}}/docs/single-sign-on/team-sync/#set-a-default-sso-provider-for-account)
57
57
You can select an IdP as the default SSO provider for a Codefresh account. This means that all the new users added to that account will automatically use the selected IdP for signin.