Fix several typos

This commit is contained in:
Andrew Schleifer
2025-11-02 09:10:12 -05:00
parent 96e0a12452
commit 926cfad2ae
13 changed files with 17 additions and 17 deletions

View File

@@ -77,7 +77,7 @@ In the Community Edition, identity providers are managed at the server level and
After you create an IdP, on the edit page, you can manage organization policies via the "Organization Policies" tab. You can set default (fallback) policies, or define them on a per org basis.
### How Organization Policies Are Evalutated
### How Organization Policies Are Evaluated
It is helpful to think of the auto provisioning process as follows:

View File

@@ -38,7 +38,7 @@ We will revisit the **Authorised redirect URIs** field later, as we do not have
## Creating an Azure Entra ID IdP in Pangolin
In Pangolin, go to "Identity Providers" and click "Add Indentity Provider". Select the Azure Entra ID provider option.
In Pangolin, go to "Identity Providers" and click "Add Identity Provider". Select the Azure Entra ID provider option.
<Frame>
<img src="/images/create-azure-idp.png" />

View File

@@ -48,7 +48,7 @@ After hitting "Create", you will be able to see the "Client ID" and "Client secr
## Creating a Google IdP in Pangolin
In Pangolin, go to "Identity Providers" and click "Add Indentity Provider". Select the Google provider option.
In Pangolin, go to "Identity Providers" and click "Add Identity Provider". Select the Google provider option.
<Frame>
<img src="/images/create-google-idp.png" />

View File

@@ -7,7 +7,7 @@ This identity provider follows the OpenID Connect protocol. This means that it c
## Creating a Generic OAuth2/OIDC IdP in Pangolin
In Pangolin, go to "Identity Providers" and click "Add Indentity Provider". Select the OAuth2/OIDC provider option.
In Pangolin, go to "Identity Providers" and click "Add Identity Provider". Select the OAuth2/OIDC provider option.
<Frame>
<img src="/images/create-oidc-idp.png" />

View File

@@ -40,7 +40,7 @@ After you have created the OIDC Client, take note of the following fields from t
## Configuring Identity Providers in Pangolin
In Pangolin, go to “Identity Providers” and click “Add Indentity Provider”. Select the OAuth2/OIDC provider option.
In Pangolin, go to “Identity Providers” and click “Add Identity Provider”. Select the OAuth2/OIDC provider option.
"Name" should be set to something memorable (eg. Pocket ID). The "Provider Type" should be set to the default `OAuth2/OIDC`.

View File

@@ -53,7 +53,7 @@ When you click create, you'll be shown the `ClientSecret` and `ClientId`. Make s
## Configuring Identity Providers in Pangolin
In Pangolin, go to “Identity Providers” and click “Add Indentity Provider”. Select the OAuth2/OIDC provider option.
In Pangolin, go to “Identity Providers” and click “Add Identity Provider”. Select the OAuth2/OIDC provider option.
"Name" should be set to something memorable (eg. Zitadel). The "Provider Type" should be set to the default `OAuth2/OIDC`.