Skip to content

Commit 228d508

Browse files
authored
Merge pull request #583 from GSA-TTS/aj/dev-docs-11_capitalize-partner-portal
Dev-Docs #11 Capitalize Partner Portal, lowercase portal
2 parents 28c27e6 + 77b24db commit 228d508

File tree

10 files changed

+18
-18
lines changed

10 files changed

+18
-18
lines changed

_data/errors.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ oidc:
77
##### Why it's happening
88
Login.gov recognizes incoming requests from Service Providers by validating the `client_id` field sent in the request and checking it against the Issuer string of Service Providers registered with Login.gov.
99
10-
This specific error occurs when Login.gov receives an OIDC request from a Service Provider that contains a `client_id` that is either not registered or not active with Login.gov. The `client_id` specified in the request must match EXACTLY the Issuer defined in the Portal.
10+
This specific error occurs when Login.gov receives an OIDC request from a Service Provider that contains a `client_id` that is either not registered or not active with Login.gov. The `client_id` specified in the request must match EXACTLY the Issuer defined in the portal.
1111
##### What to do:
1212
- Ensure the authentication request has a `client_id` value
1313
- Ensure that the `client_id` sent in the authentication request matches the Issuer registered in your application's configuration on the [Partner Portal](https://portal.int.identitysandbox.gov/){:target="_blank"}.

_includes/support/faq_csp_violation.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ <h5>Background:</h5>
44
<br/><br/>
55
The <a target="_blank" href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/form-action">CSP form-action</a> directive restricts which URLs can be used as the target of form submissions from a given context. Certain Chromium-based internet browsers (e.g. Google Chrome and Microsoft Edge) enforce the form-action directive through the entire redirect chain (if any). Other non-Chromium-based browsers only check the first redirect in the chain (e.g. Firefox). For Chromium-based browsers, upon form submission, any attempts to redirect to a url not explicitly listed as a form-action source will violate the CSP directive and cause a failure to load and a console error.
66
<br/><br/>
7-
This error occurs when Service Providers attempt to redirect users to a url that is not registered in the Redirect URLs field in the <a target="_blank" href="https://dashboard.int.identitysandbox.gov/">Login.gov Portal</a> application's configuration. All urls that users could be redirected to, even as a passthrough, need to be included in the list of Redirect URLs.
7+
This error occurs when Service Providers attempt to redirect users to a url that is not registered in the Redirect URLs field in the <a target="_blank" href="https://dashboard.int.identitysandbox.gov/">Partner Portal</a> application's configuration. All urls that users could be redirected to, even as a passthrough, need to be included in the list of Redirect URLs.
88
</p>
99
<h5>Solution:</h5>
1010
<p>
11-
Use the Network tab of your web browser to identify which redirect (302) is hanging or failing. Add that uri to the list of Redirect URIs in your Login.gov Portal integration configuration.
12-
</p>
11+
Use the Network tab of your web browser to identify which redirect (302) is hanging or failing. Add that URI to the list of Redirect URIs in your portal integration configuration.
12+
</p>

_includes/support/faq_unauthorized_sp.html

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
<h5>Background</h5>
22
<p>
3-
Login.gov recognizes incoming requests from Service Providers by validating the Issuer (for SAML) or ClientID (for OIDC) field sent in the request and checking it against Service Providers registered with Login.gov. The Issuer for each Service Provider is defined in the Issuer field on the Login.gov Portal.
3+
Login.gov recognizes incoming requests from Service Providers by validating the Issuer (for SAML) or ClientID (for OIDC) field sent in the request and checking it against Service Providers registered with Login.gov. The Issuer for each Service Provider is defined in the Issuer field on the Partner Portal.
44
<br/><br/>
5-
<img alt="Screenshot of issuer field on Login.gov portal" src="/assets/img/dashboard_issuer.png" />
5+
<img alt="Screenshot of issuer field on the portal" src="/assets/img/dashboard_issuer.png" />
66
<br/><br/>
7-
This specific error occurs when Login.gov receives a SAML request from a Service Provider that contains an Issuer field that is either not registered or not active with Login.gov. The Issuer defined in the request must match EXACTLY the Issuer defined in the Portal.
7+
This specific error occurs when Login.gov receives a SAML request from a Service Provider that contains an Issuer field that is either not registered or not active with Login.gov. The Issuer defined in the request must match EXACTLY the Issuer defined in the portal.
88
</p>
99
<h5>Solution:</h5>
1010
<p>
@@ -14,7 +14,7 @@ <h5>Solution:</h5>
1414
<li>See our video <a href="https://www.youtube.com/watch?v=SzTRc_c_5I4" class="usa-link">How to Troubleshoot and Fix "Unauthorized Service Provider" Error for SAML Integrations</a> for a detailed visual explanation.</li>
1515
</ul>
1616

17-
Note that certain Service Providers will not allow partners to set or change the Issuer value after the application is configured (e.g. MS Power Apps Portal). In this case, the best option would be to create the Login.gov Portal integration configuration after the Service Provider application has defined the Issuer and use that Issuer in the Portal.
17+
Note that certain Service Providers will not allow partners to set or change the Issuer value after the application is configured (e.g. MS Power Apps Portal). In this case, the best option would be to create the Login.gov Partner Portal integration configuration after the Service Provider application has defined the Issuer and use that Issuer in the portal.
1818
</p>
1919

2020
<!-- markdown has to be formatted left-aligned -->

_layouts/base.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,14 +120,14 @@ <h1 class="usa-logo" id="basic-logo">
120120
</section>
121121
</div>
122122
<ul class="usa-nav__primary usa-accordion flex-justify">
123-
<a href="https://dashboard.int.identitysandbox.gov/" class="mobile:display-block desktop:display-none usa-button flex-align-self-center" type="button">Go to Portal</a>
123+
<a href="https://dashboard.int.identitysandbox.gov/" class="mobile:display-block desktop:display-none usa-button flex-align-self-center" type="button">Go to portal</a>
124124
{% include nav/list.html
125125
links = site.data.nav.primary
126126
li_class = 'usa-nav__primary-item'
127127
subnav_ul_class = 'desktop:display-none usa-sidenav__sublist'
128128
%}
129129
<div class="desktop:margin-right-neg-2 grid-row flex-fill flex-justify-end">
130-
<a href="https://dashboard.int.identitysandbox.gov/" class="mobile:display-none desktop:display-inline usa-button flex-align-self-center" type="button">Go to Portal</a>
130+
<a href="https://dashboard.int.identitysandbox.gov/" class="mobile:display-none desktop:display-inline usa-button flex-align-self-center" type="button">Go to portal</a>
131131
</div>
132132
</ul>
133133
</div>

_pages/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ sidenav:
2020
<h2 id="how-to-integrate-login" class="padding-bottom-3 margin-top-0">How to integrate with Login.gov</h2>
2121
<ol class="usa-process-list margin-bottom-4">
2222
<li class="usa-process-list__item">
23-
<h3>Register your application in our partner portal</h3>
23+
<h3>Register your application in our Partner Portal</h3>
2424
<p>
2525
First, create a team. Then, follow the steps to create an application in a sandbox environment where you can configure and test without affecting your live systems. For more details, check out our instructions on <a class="usa-link" href="{% link _pages/testing.md %}#using-the-sandbox">using the sandbox</a>.
2626
</p>

_pages/oidc/token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ sidenav:
2323

2424
---
2525
{% capture client_assertion %}
26-
A [JWT](https://jwt.io/){:class="usa-link--external"} signed with the client’s private key (minimum length of 2048 bits) associated with the public key uploaded to your integration configuration within the Portal. The JWT should use the RS256 algorithm and containing the following claims:
26+
A [JWT](https://jwt.io/){:class="usa-link--external"} signed with the client’s private key (minimum length of 2048 bits) associated with the public key uploaded to your integration configuration within the portal. The JWT should use the RS256 algorithm and containing the following claims:
2727
- **iss** (string) — The issuer, which must be the `client_id`.
2828
- **sub** (string) — The subject, which must also be the `client_id`.
2929
- **aud** (string) — The audience, which should be (or, in the case of multiple audience values, include) the URL of the token endpoint, for example: `https://idp.int.identitysandbox.gov/api/openid_connect/token`

_pages/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Login.gov is a FedRAMP moderate approved multifactor authentication and identity
2828

2929
This is the configuration for your application within Login.gov’s identity provider. In the sandbox environment, you will be able to determine the configuration yourself and decide what is the best fit for your needs. In the Login.gov production environment, we will manage the final configuration.
3030
To configure a test application in the sandbox environment:
31-
* Create an account in the [Login.gov Portal](https://portal.int.identitysandbox.gov). From here you will be able to test various configurations and determine what is right for your agency.
31+
* Create an account in the [Partner Portal](https://portal.int.identitysandbox.gov). From here you will be able to test various configurations and determine what is right for your agency.
3232
* Select between [OIDC]({{ site.baseurl }}/oidc/) or [SAML]({{ site.baseurl }}/saml/) protocol implementation protocols and understand which user attributes are required.
3333
* If you have questions when testing your integration, read through our [FAQs]({{ site.baseurl }}/support/) or submit a ticket to our [technical support help desk]({{ site.baseurl}}/support/#contacting-partner-support).
3434
* Before submitting a request to move your application's configuration to production, review the [User experience]({{ site.baseurl }}/design-guidelines/) page and the [Production]({{ site.baseurl }}/production/) page. Additional requirements, like a [signed Interagency agreement]({{ site.baseurl }}/production/#confirm-interagency-agreement-iaa) (IAA) and [agency logo]({{ site.baseurl }}/user-experience/agency-logo/), are described in these pages.

_pages/production.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Make sure you have the following items ready before you start the deployment pro
3535

3636
- [Signed Interagency Agreement (IAA) listing this integration ]({{ site.baseurl}}/production/#confirm-interagency-agreement-iaa)
3737

38-
- A dedicated [integration configuration within the Portal](https://dashboard.int.identitysandbox.gov/)
38+
- A dedicated [integration configuration within the portal](https://dashboard.int.identitysandbox.gov/)
3939
* We recommend having two configurations, one that is intended for deployment to production and one which is purely for testing purposes.
4040
* All production urls should have .gov, .mil, or a dedicated .com address and point to an Authority to Operate (ATO) approved environment.
4141

@@ -69,7 +69,7 @@ Please reach out to your agency IAA contact if you have any questions. If your a
6969

7070
## Production configuration process
7171

72-
Before you can request deployment, you need to create a new and separate integration configuration on our partner portal. This new app will include your production certificate, urls, and logo. When starting this process you need the following items ready to go:
72+
Before you can request deployment, you need to create a new and separate integration configuration on our Partner Portal. This new app will include your production certificate, urls, and logo. When starting this process you need the following items ready to go:
7373

7474
- Signed IAA listing this integration 
7575
- ATO approved environment

_pages/saml/getting-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ Here are values needed to configure your service provider (SP) to work with Logi
100100
Consistent with the [SAML metadata specification](https://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf){:class="usa-link--external"}, Login.gov's metadata for our sandbox environment is available at [https://idp.int.identitysandbox.gov/api/saml/metadata{{ site.data.saml.year.current }}](https://idp.int.identitysandbox.gov/api/saml/metadata{{ site.data.saml.year.current }}).
101101

102102
### Signing Certificates
103-
Below you can find the X509 certificates used by the Login.gov IdP to sign SAML requests. **Do not enter these certificates in the Portal when configuring an application for testing** - you can follow the instructions in our [testing article]({% link _pages/testing.md %}#creating-a-public-certificate) to generate a client certificate.
103+
Below you can find the X509 certificates used by the Login.gov IdP to sign SAML requests. **Do not enter these certificates in the portal when configuring an application for testing** - you can follow the instructions in our [testing article]({% link _pages/testing.md %}#creating-a-public-certificate) to generate a client certificate.
104104

105105
{% capture saml_cert_sandbox_title %}
106106
View {{ site.data.saml.year.current }} <strong>sandbox</strong> certificate

_pages/testing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The Login.gov sandbox is an open environment to create and test integrations bet
2929

3030
**The Login.gov sandbox environment is supported M-F, 8a-5p ET.** The sandbox is typically available during these hours, though outages may occur.
3131

32-
In the sandbox environment, our [partner portal](https://portal.int.identitysandbox.gov/) is where you can manage your test applications. ***It is important to note that your Login.gov production account and your Login.gov sandbox account are two separate accounts.***
32+
In the sandbox environment, our [Partner Portal](https://portal.int.identitysandbox.gov/) is where you can manage your test applications. ***It is important to note that your Login.gov production account and your Login.gov sandbox account are two separate accounts.***
3333

3434
## Getting access to the Login.gov sandbox
3535

@@ -42,7 +42,7 @@ You can create an account in the sandbox environment on your own.
4242
Ask your agency partner to help you gain access. Login.gov will not create an account or add you to a team; your partner must do this for you.
4343

4444
**If you are with a government entity that is not a federal agency (a state or municipality) and do not have an email ending in .gov or .mil**
45-
Please submit a support ticket through the [Partner Support Help Desk](https://zendesk.login.gov) to get access to the Portal.
45+
Please submit a support ticket through the [Partner Support Help Desk](https://zendesk.login.gov) to get access to the portal.
4646

4747
## Using the sandbox
4848

0 commit comments

Comments
 (0)