From c64e33a8736d2815f17e53cbe2f365f65a580bf0 Mon Sep 17 00:00:00 2001 From: ddeyo Date: Tue, 11 Sep 2018 14:04:11 -0700 Subject: [PATCH 1/4] topic fixes for build issues --- ee/ucp/admin/configure/enable-saml-authentication.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/ee/ucp/admin/configure/enable-saml-authentication.md b/ee/ucp/admin/configure/enable-saml-authentication.md index 7194d53e9e..848bc109c3 100644 --- a/ee/ucp/admin/configure/enable-saml-authentication.md +++ b/ee/ucp/admin/configure/enable-saml-authentication.md @@ -8,8 +8,6 @@ keywords: SAML, ucp, authentication, SSO, Okta, ADFS > > This is beta content. It is not yet complete and should be considered a work in progress. This content is subject to change without notice. -Ping Identity integration requires these values: - SAML is commonly supported by enterprise authentication systems. SAML-based single sign-on (SSO) gives you access to UCP through a SAML 2.0-compliant identity provider. SAML-based single sign-on (SSO) gives you access to UCP through a SAML 2.0-compliant identity provider. UCP supports SAML for authentication as a service provider integrated with your identity provider. @@ -18,8 +16,8 @@ For more information about SAML, see the [SAML XML website] (http://saml.xml.org UCP supports these identity providers: -- (Okta) [https://www.okta.com/] -- (ADFS) [https://docs.microsoft.com/en-us/windows-server/identity/active-directory-federation-services] +- (Okta)[https://www.okta.com/] +- (ADFS)[https://docs.microsoft.com/en-us/windows-server/identity/active-directory-federation-services] ## Configure identity provider integration @@ -29,8 +27,8 @@ There are values your identity provider needs for successful integration with UC Okta integration requires these values: -- URL for single signon (SSO). This value is the URL for UCP, qualified with `/enzi/v0/saml/acs`. For example, `https://<^>111.111.111.111<^^>/enzi/v0/saml/acs`. -- Service provider audience URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://<^>111.111.111.111<^^>/enzi/v0/saml/metadata`. +- URL for single signon (SSO). This value is the URL for UCP, qualified with `/enzi/v0/saml/acs`. For example, `https://111.111.111.111/enzi/v0/saml/acs`. +- Service provider audience URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://111.111.111.111/enzi/v0/saml/metadata`. - NameID format. Select Unspecified. - Application username. Email (For example, a custom `${f:substringBefore(user.email, "@")}` specifies the username portion of the email address. - Attribute Statements: From 81061eecca535cb5efd93881c749066a454bc0b1 Mon Sep 17 00:00:00 2001 From: ddeyo Date: Tue, 11 Sep 2018 14:36:28 -0700 Subject: [PATCH 2/4] more build fixes --- ee/ucp/admin/configure/enable-saml-authentication.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/ee/ucp/admin/configure/enable-saml-authentication.md b/ee/ucp/admin/configure/enable-saml-authentication.md index 848bc109c3..a689340c3c 100644 --- a/ee/ucp/admin/configure/enable-saml-authentication.md +++ b/ee/ucp/admin/configure/enable-saml-authentication.md @@ -42,7 +42,7 @@ Name: `is-admin`, Filter: (user defined) for identifying if the user is an admin ADFS integration requires these values: -- Service provider metadata URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://<^>111.111.111.111<^^>/enzi/v0/saml/metadata`. +- Service provider metadata URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://111.111.111.111/enzi/v0/saml/metadata`. - Attribute Store: Active Directory. - Add LDAP Attribute = Email Address; Outgoing Claim Type: Email Address - Add LDAP Attribute = Display-Name; Outgoing Claim Type: Common Name @@ -56,15 +56,15 @@ ADFS integration requires these values: To enable SAML authentication: -1 Go to the UCP web UI. +1. Go to the UCP web UI. 2. Navigate to the **Admin Settings**. 3. Select **Authentication & Authorization**. -![Enabling SAML in UCP](../../images/saml_enabled.png) + ![Enabling SAML in UCP](../../images/saml_enabled.png) 4. In the **SAML Enabled** section, select **Yes** to display the required settings. -![Configuring SAML in UCP](../../images/saml_settings.png) + ![Configuring SAML in UCP](../../images/saml_settings.png) 5. In **IdP Metadata URL** enter the URL for the identity provider's metadata. 6. In **UCP Host** enter the URL that includes the IP address of your UCP console. From 8c1fe10c041ac0df067b116df843bb2a26f45d04 Mon Sep 17 00:00:00 2001 From: ddeyo Date: Wed, 12 Sep 2018 10:46:22 -0700 Subject: [PATCH 3/4] links fixed --- ee/ucp/admin/configure/enable-saml-authentication.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/ee/ucp/admin/configure/enable-saml-authentication.md b/ee/ucp/admin/configure/enable-saml-authentication.md index a689340c3c..5d64a4ef93 100644 --- a/ee/ucp/admin/configure/enable-saml-authentication.md +++ b/ee/ucp/admin/configure/enable-saml-authentication.md @@ -12,12 +12,12 @@ SAML is commonly supported by enterprise authentication systems. SAML-based sing SAML-based single sign-on (SSO) gives you access to UCP through a SAML 2.0-compliant identity provider. UCP supports SAML for authentication as a service provider integrated with your identity provider. -For more information about SAML, see the [SAML XML website] (http://saml.xml.org/). +For more information about SAML, see the [SAML XML website](http://saml.xml.org/). UCP supports these identity providers: -- (Okta)[https://www.okta.com/] -- (ADFS)[https://docs.microsoft.com/en-us/windows-server/identity/active-directory-federation-services] +- [Okta](https://www.okta.com/) +- [ADFS](https://docs.microsoft.com/en-us/windows-server/identity/active-directory-federation-services) ## Configure identity provider integration From aee22243a07e3df3389b4b6be6d81307e1e17349 Mon Sep 17 00:00:00 2001 From: ddeyo Date: Wed, 12 Sep 2018 11:19:48 -0700 Subject: [PATCH 4/4] format fixes --- ee/ucp/admin/configure/enable-saml-authentication.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ee/ucp/admin/configure/enable-saml-authentication.md b/ee/ucp/admin/configure/enable-saml-authentication.md index 5d64a4ef93..d57e1477ff 100644 --- a/ee/ucp/admin/configure/enable-saml-authentication.md +++ b/ee/ucp/admin/configure/enable-saml-authentication.md @@ -56,7 +56,7 @@ ADFS integration requires these values: To enable SAML authentication: -1. Go to the UCP web UI. +1. Go to the UCP web interface. 2. Navigate to the **Admin Settings**. 3. Select **Authentication & Authorization**.