clean up client install/configure and add sidebar cta

This commit is contained in:
miloschwartz
2026-02-12 16:43:19 -08:00
parent 39429997d5
commit 202e25b9f6
103 changed files with 736 additions and 2 deletions

View File

@@ -3,6 +3,12 @@ title: "Add Identity Providers"
description: "Configure external identity providers for user authentication to resources and the organization"
---
import PangolinCloudTocCta from "/snippets/pangolin-cloud-toc-cta.mdx";
<PangolinCloudTocCta />
Identity providers allow your users to log into Pangolin and Pangolin resources using their existing accounts from external identity systems like Google, Microsoft Azure, or Okta. Instead of creating separate Pangolin accounts, users can authenticate with their familiar work or personal credentials.
Here is an example using Microsoft Azure Entra ID as SSO for Pangolin:

View File

@@ -3,6 +3,12 @@ title: "Auto Provisioning"
description: "Automatically create and manage user accounts from external identity providers"
---
import PangolinCloudTocCta from "/snippets/pangolin-cloud-toc-cta.mdx";
<PangolinCloudTocCta />
Auto provisioning is a feature that allows you to automatically create and manage user accounts in Pangolin when they log in using an external identity provider rather than pre-provisioning a user with a role. This is useful for organizations that want to streamline the onboarding process for new users and ensure that their user accounts are always up-to-date.
You will be able to programmatically decide the roles and organizations for new users based on the information provided by the identity provider.

View File

@@ -3,6 +3,12 @@ title: "Azure Entra ID"
description: "Configure Azure Entra ID Single Sign-On"
---
import PangolinCloudTocCta from "/snippets/pangolin-cloud-toc-cta.mdx";
<PangolinCloudTocCta />
<Note>
Azure SSO is only available on Pangolin Cloud and [Enterprise Edition](/self-host/enterprise-edition) deployments. In [Enterprise Edition](/self-host/enterprise-edition), you must set `app.identity_provider_mode: "org"` in your [private config file](/self-host/advanced/private-config-file) `privateConfig.yml`.
</Note>

View File

@@ -3,6 +3,12 @@ title: "Google"
description: "Configure Google Single Sign-On"
---
import PangolinCloudTocCta from "/snippets/pangolin-cloud-toc-cta.mdx";
<PangolinCloudTocCta />
<Note>
Google SSO is only available on Pangolin Cloud and [Enterprise Edition](/self-host/enterprise-edition) deployments. In [Enterprise Edition](/self-host/enterprise-edition), you must set `app.identity_provider_mode: "org"` in your [private config file](/self-host/advanced/private-config-file#param-use-org-only-idp) `privateConfig.yml`.
</Note>

View File

@@ -3,6 +3,12 @@ title: "OAuth2/OIDC"
description: "Configure OpenID Connect identity provider for external authentication"
---
import PangolinCloudTocCta from "/snippets/pangolin-cloud-toc-cta.mdx";
<PangolinCloudTocCta />
This identity provider follows the OpenID Connect protocol. This means that it can be used to connect to any external identity provider that supports the OpenID Connect protocol such as Authentik, Keycloak, Okta, etc.
## Creating a Generic OAuth2/OIDC IdP in Pangolin

View File

@@ -3,6 +3,12 @@ title: "Pocket ID"
description: "Configure Pocket ID Single Sign-On using OpenID Connect"
---
import PangolinCloudTocCta from "/snippets/pangolin-cloud-toc-cta.mdx";
<PangolinCloudTocCta />
The following steps will integrate Pocket ID with Pangolin SSO using OpenID Connect (OIDC).
## Prerequisites

View File

@@ -3,6 +3,12 @@ title: "Zitadel"
description: "Configure Zitadel Single Sign-On using OpenID Connect"
---
import PangolinCloudTocCta from "/snippets/pangolin-cloud-toc-cta.mdx";
<PangolinCloudTocCta />
The following steps will integrate Zitadel with Pangolin SSO using OpenID Connect (OIDC).
## Prerequisites