Fixing Gaps

This commit is contained in:
Brandon Hopkins
2026-01-06 16:00:17 -08:00
parent 6188abf2b2
commit 0645790eeb
2 changed files with 0 additions and 4 deletions

View File

@@ -58,7 +58,6 @@ For organizations with specific requirements or existing IdP investments:
---
<a id="adding-external-identity-providers"></a>
## Adding External Identity Providers
NetBird supports connecting **multiple external identity providers** alongside local user management. This allows users to sign in with their existing accounts from services like Google, Microsoft, or your corporate identity provider—while still maintaining the option for local username/password authentication.
@@ -297,7 +296,6 @@ Managed Identity Providers handle infrastructure and maintenance for you. See ea
In addition to OIDC-based authentication, NetBird supports provisioning users and groups through SCIM and the API. However, this functionality is not available in the open source Community Edition. It is offered only in the cloud-managed version of NetBird or through a [Commercial License](https://netbird.io/pricing#on-prem) for enterprise self-hosted deployments.
<a id="migration-guide"></a>
## Migration Guide
If you have an existing NetBird deployment using a standalone IdP (like Zitadel from the previous quickstart), you have several options:

View File

@@ -115,7 +115,6 @@ openssl rand -base64 32
Store your encryption key securely. If lost, encrypted user data (emails, names) cannot be recovered. Include it in your backup procedures.
</Note>
<a id="user-management"></a>
## User Management
### Creating Users via Dashboard
@@ -186,7 +185,6 @@ Users created through the embedded IdP can be assigned roles:
| **Admin** | Manage users, peers, policies, and settings |
| **User** | Connect devices, view assigned resources |
<a id="instance-setup-first-run"></a>
## Instance Setup (First Run)
When NetBird starts with the embedded IdP and no existing accounts, the Dashboard redirects to the `/setup` route and displays the **Instance Setup Wizard**: