mirror of
https://github.com/fosrl/docs-v2.git
synced 2026-02-08 05:56:45 +00:00
Fix several typos
This commit is contained in:
@@ -77,7 +77,7 @@ In the Community Edition, identity providers are managed at the server level and
|
||||
|
||||
After you create an IdP, on the edit page, you can manage organization policies via the "Organization Policies" tab. You can set default (fallback) policies, or define them on a per org basis.
|
||||
|
||||
### How Organization Policies Are Evalutated
|
||||
### How Organization Policies Are Evaluated
|
||||
|
||||
It is helpful to think of the auto provisioning process as follows:
|
||||
|
||||
|
||||
@@ -38,7 +38,7 @@ We will revisit the **Authorised redirect URIs** field later, as we do not have
|
||||
|
||||
## Creating an Azure Entra ID IdP in Pangolin
|
||||
|
||||
In Pangolin, go to "Identity Providers" and click "Add Indentity Provider". Select the Azure Entra ID provider option.
|
||||
In Pangolin, go to "Identity Providers" and click "Add Identity Provider". Select the Azure Entra ID provider option.
|
||||
|
||||
<Frame>
|
||||
<img src="/images/create-azure-idp.png" />
|
||||
|
||||
@@ -48,7 +48,7 @@ After hitting "Create", you will be able to see the "Client ID" and "Client secr
|
||||
|
||||
## Creating a Google IdP in Pangolin
|
||||
|
||||
In Pangolin, go to "Identity Providers" and click "Add Indentity Provider". Select the Google provider option.
|
||||
In Pangolin, go to "Identity Providers" and click "Add Identity Provider". Select the Google provider option.
|
||||
|
||||
<Frame>
|
||||
<img src="/images/create-google-idp.png" />
|
||||
|
||||
@@ -7,7 +7,7 @@ This identity provider follows the OpenID Connect protocol. This means that it c
|
||||
|
||||
## Creating a Generic OAuth2/OIDC IdP in Pangolin
|
||||
|
||||
In Pangolin, go to "Identity Providers" and click "Add Indentity Provider". Select the OAuth2/OIDC provider option.
|
||||
In Pangolin, go to "Identity Providers" and click "Add Identity Provider". Select the OAuth2/OIDC provider option.
|
||||
|
||||
<Frame>
|
||||
<img src="/images/create-oidc-idp.png" />
|
||||
|
||||
@@ -40,7 +40,7 @@ After you have created the OIDC Client, take note of the following fields from t
|
||||
|
||||
## Configuring Identity Providers in Pangolin
|
||||
|
||||
In Pangolin, go to “Identity Providers” and click “Add Indentity Provider”. Select the OAuth2/OIDC provider option.
|
||||
In Pangolin, go to “Identity Providers” and click “Add Identity Provider”. Select the OAuth2/OIDC provider option.
|
||||
|
||||
"Name" should be set to something memorable (eg. Pocket ID). The "Provider Type" should be set to the default `OAuth2/OIDC`.
|
||||
|
||||
|
||||
@@ -53,7 +53,7 @@ When you click create, you'll be shown the `ClientSecret` and `ClientId`. Make s
|
||||
|
||||
## Configuring Identity Providers in Pangolin
|
||||
|
||||
In Pangolin, go to “Identity Providers” and click “Add Indentity Provider”. Select the OAuth2/OIDC provider option.
|
||||
In Pangolin, go to “Identity Providers” and click “Add Identity Provider”. Select the OAuth2/OIDC provider option.
|
||||
|
||||
"Name" should be set to something memorable (eg. Zitadel). The "Provider Type" should be set to the default `OAuth2/OIDC`.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user