mirror of
https://github.com/netbirdio/docs.git
synced 2026-04-21 01:46:35 +00:00
Fix broken links (#92)
This commit is contained in:
@@ -190,7 +190,7 @@ Keycloak is an open source software product to allow single sign-on with Identit
|
||||
|
||||
<Note>
|
||||
If you prefer not to self-host an Identity and Access Management solution, then you could use a managed alternative like
|
||||
[Auth0](/integrations/identity-providers/self-hosted/using-netbird-with-auth0).
|
||||
[Auth0](/selfhosted/identity-providers#auth0).
|
||||
</Note>
|
||||
|
||||
The following guide is an adapted version of the original
|
||||
@@ -443,7 +443,7 @@ This guide is a part of the [NetBird Self-hosting Guide](/docs/selfhosted/selfho
|
||||
|
||||
<Note>
|
||||
If you prefer not to self-host an Identity and Access Management solution, then you could use a managed alternative like
|
||||
[Auth0](/integrations/identity-providers/self-hosted/using-netbird-with-auth0).
|
||||
[Auth0](/selfhosted/identity-providers#auth0).
|
||||
</Note>
|
||||
|
||||
#### Step 1: Create OAuth2/OpenID Provider
|
||||
@@ -564,7 +564,7 @@ It is a 3rd party managed service and can't be self-hosted.
|
||||
|
||||
<Note>
|
||||
If you prefer to have full control over authentication and authorization of your NetBird network, there are good
|
||||
self-hosted alternatives to the managed Auth0 service like [Keycloak](/integrations/identity-providers/self-hosted/using-netbird-with-keycloak).
|
||||
self-hosted alternatives to the managed Auth0 service like [Keycloak](/selfhosted/identity-providers#keycloak).
|
||||
</Note>
|
||||
|
||||
Before you start creating and configuring an Azure AD application, ensure that you have the following:
|
||||
@@ -718,11 +718,11 @@ You've configured all required resources in Azure AD. You can now continue with
|
||||
|
||||
### Okta
|
||||
|
||||
This guide is a part of the [NetBird Self-hosting Guide](/getting-started/self-hosting) and explains how to integrate
|
||||
This guide is a part of the [NetBird Self-hosting Guide](/selfhosted/selfhosted-guide) and explains how to integrate
|
||||
**self-hosted** NetBird with [Okta](https://www.okta.com/).
|
||||
|
||||
<Note>
|
||||
If you prefer to have full control over authentication and authorization of your NetBird network, there are good self-hosted alternatives to the managed Okta service like [Keycloak](/integrations/identity-providers/self-hosted/using-netbird-with-keycloak).
|
||||
If you prefer to have full control over authentication and authorization of your NetBird network, there are good self-hosted alternatives to the managed Okta service like [Keycloak](/selfhosted/identity-providers#keycloak).
|
||||
</Note>
|
||||
|
||||
Before you start creating and configuring an Okta application, ensure that you have an Okta workforce identity cloud account. If you don't have one, sign up for a free account at https://www.okta.com/free-trial/.
|
||||
@@ -846,7 +846,7 @@ You've configured all required resources in Okta. You can now continue with the
|
||||
|
||||
### Google Workspace
|
||||
|
||||
This guide is a part of the [NetBird Self-hosting Guide](/getting-started/self-hosting) and explains how to integrate
|
||||
This guide is a part of the [NetBird Self-hosting Guide](/selfhosted/selfhosted-guide) and explains how to integrate
|
||||
**self-hosted** NetBird with [Google Workspace](https://workspace.google.com/).
|
||||
|
||||
Before you start creating and configuring an Google Workspace application, ensure that you have the following:
|
||||
@@ -1007,7 +1007,7 @@ instance on your own.
|
||||
|
||||
<Note>
|
||||
If you prefer to have full control over authentication and authorization of your NetBird network, there are good
|
||||
self-hosted alternatives to the managed Auth0 service like [Keycloak](/integrations/identity-providers/self-hosted/using-netbird-with-keycloak).
|
||||
self-hosted alternatives to the managed Auth0 service like [Keycloak](/selfhosted/identity-providers#keycloak).
|
||||
</Note>
|
||||
|
||||
#### Step 1: Create Auth0 account
|
||||
|
||||
Reference in New Issue
Block a user