diff --git a/docs.json b/docs.json
index fa97afd..142bea3 100644
--- a/docs.json
+++ b/docs.json
@@ -151,6 +151,7 @@
"group": "Advanced Configuration",
"pages": [
"self-host/advanced/config-file",
+ "self-host/advanced/private-config-file",
"self-host/advanced/wild-card-domains",
"self-host/advanced/cloudflare-proxy",
"self-host/advanced/without-tunneling",
diff --git a/images/cf_websocket_box.png b/images/cf_websocket_box.png
new file mode 100644
index 0000000..8d8653b
Binary files /dev/null and b/images/cf_websocket_box.png differ
diff --git a/manage/identity-providers/add-an-idp.mdx b/manage/identity-providers/add-an-idp.mdx
index 7ca6a99..932fd5f 100644
--- a/manage/identity-providers/add-an-idp.mdx
+++ b/manage/identity-providers/add-an-idp.mdx
@@ -26,6 +26,24 @@ Here is an example using Microsoft Azure Entra ID as SSO for Pangolin:
+## Identity Provider Types
+
+### Organization Identity Providers
+
+Organization identity providers are configured per organization and only apply to that specific organization. Each org can have its own identity providers, allowing for authentication methods based on the organization's needs.
+
+
+ In Pangolin Enterprise you must enable `use_org_only_idp` in the [private config file](/self-host/advanced/private-config-file#param-use-org-only-idp) `privateConfig.yml`.
+
+
+### Global Identity Providers
+
+Global identity providers are managed at the server level and not the individual organization. They can apply to all or some organizations on the server. This means you must define policies per organization to map users to specific organizations and roles within those organizations.
+
+
+ Global identity providers are the only supported method in Pangolin Community.
+
+
## Supported Identity Providers
### OAuth2/OIDC
@@ -40,7 +58,7 @@ This can be used to connect to any external identity provider that supports the
### Google
-Google IdP is only available in Pangolin Cloud.
+Google IdP is only available in Pangolin Cloud or Pangolin Enterprise with org identity providers. See above to enable.
Easily set up Google Workspace authentication for your organization. Users can sign in with their Google accounts and access Pangolin resources using their existing Google credentials. Perfect for organizations already using Google Workspace for email, calendar, and other services.
@@ -48,7 +66,7 @@ Easily set up Google Workspace authentication for your organization. Users can s
### Azure Entra ID
-Azure Entra ID IdP is only available in Pangolin Cloud.
+Azure Entra ID IdP is only available in Pangolin Cloud or Pangolin Enterprise with org identity providers. See above to enable.
Integrate with Microsoft's enterprise identity platform to allow users to authenticate using their Azure Active Directory accounts. Ideal for organizations using Microsoft 365 or other Azure services, providing seamless single sign-on across your Microsoft ecosystem.
@@ -56,7 +74,7 @@ Integrate with Microsoft's enterprise identity platform to allow users to authen
## How to Add an Identity Provider
-In the CE and EE, identity providers are created and managed via the Server Admin UI rather than the organization settings.
+When using global IDPs, identity providers are created and managed via the Server Admin UI rather than the organization settings.
diff --git a/manage/identity-providers/auto-provisioning.mdx b/manage/identity-providers/auto-provisioning.mdx
index 5261a8a..46b0d6e 100644
--- a/manage/identity-providers/auto-provisioning.mdx
+++ b/manage/identity-providers/auto-provisioning.mdx
@@ -71,9 +71,7 @@ contains(groups, 'admin') && 'Admin' || 'Member'
This example will return the string "Admin". If the user is not a member of the "admin" group, it will return "Member".
-## Community Edition
-
-In the Community Edition, identity providers are managed at the server level and not the individual organization. This means you must define policies per organization to map users to specific organizations and roles within those organizations.
+## Global Identity Providers
After you create an IdP, on the edit page, you can manage organization policies via the "Organization Policies" tab. You can set default (fallback) policies, or define them on a per org basis.
diff --git a/manage/identity-providers/azure.mdx b/manage/identity-providers/azure.mdx
index b6aa497..58d770c 100644
--- a/manage/identity-providers/azure.mdx
+++ b/manage/identity-providers/azure.mdx
@@ -3,6 +3,10 @@ title: "Azure Entra ID"
description: "Configure Azure Entra ID Single Sign-On"
---
+
+Azure SSO is only available on Pangolin Cloud and Enterprise deployments. In enterprise, you must enable `use_org_only_idp` in your [private config file](/self-host/advanced/private-config-file) `privateConfig.yml`.
+
+
The following steps will integrate Microsoft SSO using the built in Azure Entra ID identity provider in Pangolin.