Skip to content

Commit

Permalink
[version-4-2] Fix markup and alignment in User Management (SSO) and a…
Browse files Browse the repository at this point in the history
…dd HTTPS and TLS requirements (#3345) (#3358)

* Fix markup and alignment in User Management (SSO) and add HTTPS and TLS requirements (#3345)

* chore: Fix markup and alignment in the User Management > SSO section

* docs: Add notes that require HTTPS and TLS for SSO providers

* docs: Convert admonitions to bullets in prerequisites

* chore: Fix things that weren't fixed with cherry-picking
  • Loading branch information
yuliiiah committed Jul 12, 2024
1 parent 1c8d69f commit d097e94
Show file tree
Hide file tree
Showing 6 changed files with 311 additions and 523 deletions.
212 changes: 74 additions & 138 deletions docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,8 @@ Use the following steps to enable OIDC SSO in Palette with Microsoft Entra ID.

- Palette or Palette VerteX version 4.0.X or greater.

- For Microsoft Entra ID to work correctly with Palette, you must enable HTTPS and configure TLS.

- A [Microsoft Entra ID](https://entra.microsoft.com/#home) subscription. You will need an account with one of the
following roles: Global Administrator, Cloud Application Administrator, or Application Administrator. Alternatively,
you may be the owner of the service principal.
Expand Down Expand Up @@ -118,7 +120,7 @@ Use the following steps to enable OIDC SSO in Palette with Microsoft Entra ID.
| **Directory (tenant) ID** | The Directory ID is the unique identifier for your Azure AD tenant. |
| **Secret Value** | The Secret Value is the value of the client secret you created in the previous steps. |

<details>
<details>

<summary>Additional Redirect URLs</summary>

Expand All @@ -130,7 +132,7 @@ Use the following steps to enable OIDC SSO in Palette with Microsoft Entra ID.
| `http://localhost:8000` | UsUseing kubectl with the kube-login plugin from a workstation |
| `https://<fqdn_of_k8s_dashboard>/oauth/callback` | Use OIDC to authenticate and log in to the Kubernetes Dashboard |

</details>
</details>

#### Configure Microsoft Entra ID with Users and Groups

Expand Down Expand Up @@ -276,6 +278,8 @@ Use the following steps to enable OIDC in Kubernetes clusters with Microsoft Ent

- Palette or Palette VerteX version 4.0.X or greater.

- For Microsoft Entra ID to work correctly with Palette, you must enable HTTPS and configure TLS.

- OIDC configured in Palette with Microsoft Entra ID. Refer to the
[Enable OIDC SSO in Palette](#enable-oidc-sso-in-palette) section for detailed guidance on how to configure OIDC in
Palette.
Expand Down
Loading

0 comments on commit d097e94

Please sign in to comment.