Skip to content

Commit 10845b2

Browse files
committed
docs: update SSO pricing
1 parent ff63fc1 commit 10845b2

File tree

8 files changed

+48
-39
lines changed

8 files changed

+48
-39
lines changed

content/docs/administration/sso/ldap.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Lightweight Directory Access Protocol (LDAP)
3+
feature_name: SSO_ADVANCED
34
---
45

56
Lightweight Directory Access Protocol (LDAP) is a vendor-neutral software protocol used to lookup information or devices within a network. Bytebase supports using LDAP for configuring Single Sign-On (SSO).
@@ -8,25 +9,25 @@ Lightweight Directory Access Protocol (LDAP) is a vendor-neutral software protoc
89

910
Basic information:
1011

11-
* **Name**: the display name shown to your users (e.g. `JumpCloud`)
12-
* **Identity Provider ID**: a human-readable unique string, only lower-case alphabets and hyphens are allowed (e.g. `jumpcloud`)
13-
* **Domain**: the domain name to scope associated users (e.g. `jumpcloud.com`, optional)
12+
- **Name**: the display name shown to your users (e.g. `JumpCloud`)
13+
- **Identity Provider ID**: a human-readable unique string, only lower-case alphabets and hyphens are allowed (e.g. `jumpcloud`)
14+
- **Domain**: the domain name to scope associated users (e.g. `jumpcloud.com`, optional)
1415

1516
Identity provider information:
1617

17-
* **Host**: the host of LDAP server (e.g. `ldap.jumpcloud.com`)
18-
* **Port**: the port number of the LDAP server, usually 389 for StartTLS and 636 for LDAPS
19-
* **Bind DN**: the Distinguished Name (DN) of the user to bind as a service account to perform search requests (e.g. `uid=system,ou=Users,dc=jumpcloud,dc=com`)
20-
* **Bind Password**: the password of the user to bind as a service account
21-
* **Base DN**: the base Distinguished Name (DN) to search for users (e.g. `ou=users,dc=jumpcloud,dc=com`)
22-
* **User Filter**: the filter to search for users (e.g. `(uid=%s)`, where `%s` will be subsituted by the username)
23-
* **Security protocol**: the security protocol to be used for establishing connections with the LDAP server
18+
- **Host**: the host of LDAP server (e.g. `ldap.jumpcloud.com`)
19+
- **Port**: the port number of the LDAP server, usually 389 for StartTLS and 636 for LDAPS
20+
- **Bind DN**: the Distinguished Name (DN) of the user to bind as a service account to perform search requests (e.g. `uid=system,ou=Users,dc=jumpcloud,dc=com`)
21+
- **Bind Password**: the password of the user to bind as a service account
22+
- **Base DN**: the base Distinguished Name (DN) to search for users (e.g. `ou=users,dc=jumpcloud,dc=com`)
23+
- **User Filter**: the filter to search for users (e.g. `(uid=%s)`, where `%s` will be subsituted by the username)
24+
- **Security protocol**: the security protocol to be used for establishing connections with the LDAP server
2425

2526
User information field mapping:
2627

27-
* **Email**: the attribute to be used as the Bytebase user email address (e.g. `mail`)
28-
* **Display name**: the attribute to be used as the Bytebase user display name (e.g. `displayName`, optional)
29-
* **Phone**: the attribute to be used as the Bytebase user phone number (e.g. `phone`, optional)
28+
- **Email**: the attribute to be used as the Bytebase user email address (e.g. `mail`)
29+
- **Display name**: the attribute to be used as the Bytebase user display name (e.g. `displayName`, optional)
30+
- **Phone**: the attribute to be used as the Bytebase user phone number (e.g. `phone`, optional)
3031

3132
### JumpCloud
3233

@@ -73,4 +74,3 @@ The attribute `uid` is the username (e.g. `system`) not the email (e.g. `system@
7374
- **Security protocol** `StartTLS`
7475
- **Email**: `mail`
7576
- **Display name**: `cn`
76-

content/docs/administration/sso/oauth2.md

Lines changed: 19 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,23 @@ If you start Bytebase with `--external-url http://bytebase.example.com`, then th
6060

6161
Bytebase provides templates for configuring built-in OAuth providers.
6262

63+
### Google
64+
65+
<PricingPlanBlock feature_name='SSO_BASIC' />
66+
67+
1. Follow the [Using OAuth 2.0 to Access Google APIs](https://developers.google.com/identity/protocols/oauth2) to create OAuth 2.0 client credentials in [Google API Console](https://console.developers.google.com/).
68+
69+
![google-oauth-app-config](/content/docs/administration/sso/google-oauth-app-config.webp)
70+
71+
2. Open creating SSO dialog and select the **Google** template.
72+
3. Update the **Client ID** and **Client secret** fields with the OAuth 2.0 client credential you just created.
73+
4. After filling in all the required fields, try to click **Test connection**.
74+
5. If everything is OK, click the **Create** button.
75+
6376
### GitHub
6477

78+
<PricingPlanBlock feature_name='SSO_BASIC' />
79+
6580
1. Follow [Creating an OAuth App in GitHub](https://docs.github.com/en/developers/apps/building-oauth-apps/creating-an-oauth-app) to create an OAuth app in GitHub.
6681

6782
![github-oauth-app-config](/content/docs/administration/sso/github-oauth-app-config.webp)
@@ -73,6 +88,8 @@ Bytebase provides templates for configuring built-in OAuth providers.
7388

7489
### GitLab
7590

91+
<PricingPlanBlock feature_name='SSO_ADVANCED' />
92+
7693
1. Follow [Configure GitLab as an OAuth 2.0 authentication identity provider](https://docs.gitlab.com/ee/integration/oauth_provider.html) to create an OAuth 2 application in GitLab.
7794

7895
![gitlab-oauth-app-config](/content/docs/administration/sso/gitlab-oauth-app-config.webp)
@@ -82,19 +99,10 @@ Bytebase provides templates for configuring built-in OAuth providers.
8299
4. After filling in all the required fields, try to click **Test connection**.
83100
5. If everything is OK, click the **Create** button.
84101

85-
### Google
86-
87-
1. Follow the [Using OAuth 2.0 to Access Google APIs](https://developers.google.com/identity/protocols/oauth2) to create OAuth 2.0 client credentials in [Google API Console](https://console.developers.google.com/).
88-
89-
![google-oauth-app-config](/content/docs/administration/sso/google-oauth-app-config.webp)
90-
91-
2. Open creating SSO dialog and select the **Google** template.
92-
3. Update the **Client ID** and **Client secret** fields with the OAuth 2.0 client credential you just created.
93-
4. After filling in all the required fields, try to click **Test connection**.
94-
5. If everything is OK, click the **Create** button.
95-
96102
### Microsoft Entra (Azure AD)
97103

104+
<PricingPlanBlock feature_name='SSO_ADVANCED' />
105+
98106
1. Follow the [Register an application with the Microsoft identity platform](https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app) to create an Application in [Microsoft Entra admin center](https://entra.microsoft.com/).
99107

100108
![entra-endpoints](/content/docs/administration/sso/entra-endpoints.webp)

content/docs/administration/sso/oidc.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: OpenID Connect (OIDC)
3+
feature_name: SSO_ADVANCED
34
---
45

56
OpenID Connect (OIDC) is a simple identity layer on top of the OAuth 2.0 protocol. Bytebase supports using OIDC for configuring Single Sign-On (SSO).

content/docs/administration/sso/overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
title: Single Sign-On (SSO)
3-
feature_name: SSO
43
---
54

65
Single Sign-On (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.

src/components/pages/pricing/hero/hero.tsx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ const cards: TCard[] = [
5050
'Up to 20 users',
5151
'10 database instances',
5252
'Manual review, scheduled rollout',
53-
'Batch change',
53+
'Google, GitHub SSO',
5454
],
5555
},
5656
{
@@ -66,7 +66,7 @@ const cards: TCard[] = [
6666
'SLA support',
6767
'Unlimited users',
6868
'Unlimited database instances',
69-
'SSO, SCIM, 2FA, Audit log',
69+
'OIDC, LDAP SSO, SCIM, 2FA, Audit log',
7070
'Custom approval, dynamic data masking',
7171
],
7272
},

src/components/pages/pricing/table/data/pricing-plans.ts

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -48,12 +48,13 @@ const PLANS: { free: Plan; pro: Plan; enterprise: Plan } = {
4848
shared: false,
4949
},
5050
security: {
51+
sso: false,
5152
rbac: true,
5253
'slow-query': true,
5354
archiving: true,
5455
'secret-variable': false,
56+
'signup-restriction': false,
5557
'secret-manager': false,
56-
sso: false,
5758
scim: false,
5859
twofa: false,
5960
ssh: false,
@@ -63,7 +64,6 @@ const PLANS: { free: Plan; pro: Plan; enterprise: Plan } = {
6364
'access-control': false,
6465
watermark: false,
6566
'audit-log': false,
66-
'signup-restriction': false,
6767
'signin-frequency': false,
6868
anomaly: { value: 'Basic', tooltip: 'Connection failure' },
6969
},
@@ -126,12 +126,13 @@ const PLANS: { free: Plan; pro: Plan; enterprise: Plan } = {
126126
shared: true,
127127
},
128128
security: {
129+
sso: 'Google, GitHub',
129130
rbac: true,
130131
'slow-query': true,
131132
archiving: true,
132133
'secret-variable': true,
134+
'signup-restriction': true,
133135
'secret-manager': false,
134-
sso: false,
135136
scim: false,
136137
twofa: false,
137138
ssh: false,
@@ -141,7 +142,6 @@ const PLANS: { free: Plan; pro: Plan; enterprise: Plan } = {
141142
'access-control': false,
142143
watermark: false,
143144
'audit-log': false,
144-
'signup-restriction': false,
145145
'signin-frequency': false,
146146
anomaly: { value: 'Basic', tooltip: 'Connection failure' },
147147
},
@@ -204,12 +204,13 @@ const PLANS: { free: Plan; pro: Plan; enterprise: Plan } = {
204204
shared: true,
205205
},
206206
security: {
207+
sso: 'OAuth, LDAP, OIDC',
207208
rbac: true,
208209
'slow-query': true,
209210
archiving: true,
210211
'secret-variable': true,
212+
'signup-restriction': true,
211213
'secret-manager': true,
212-
sso: true,
213214
scim: true,
214215
twofa: true,
215216
ssh: true,
@@ -219,7 +220,6 @@ const PLANS: { free: Plan; pro: Plan; enterprise: Plan } = {
219220
'access-control': true,
220221
watermark: true,
221222
'audit-log': true,
222-
'signup-restriction': true,
223223
'signin-frequency': true,
224224
anomaly: { value: 'Advanced', tooltip: 'Basic + Schema drift detection' },
225225
},
@@ -283,22 +283,22 @@ const LABELS = [
283283
{
284284
title: 'Data Security & Compliance',
285285
items: {
286+
sso: 'Single sign-on (SSO)',
286287
rbac: 'RBAC',
287288
'slow-query': 'Slow Query',
288289
archiving: 'Archiving',
289290
'secret-variable': 'Secret variable',
291+
'signup-restriction': 'Self-signup restriction',
290292
'secret-manager': 'External secret manager',
291-
sso: 'Single sign-on (SSO)',
292293
scim: 'SCIM',
293294
twofa: 'Two-factor authentication (2FA)',
294295
ssh: 'SSH tunnel',
295296
'query-and-export-workflow': 'Query and export approval workflow',
296297
environment: 'Environment tier',
297-
masking: 'Sensitive data masking',
298+
masking: 'Dynamic data masking',
298299
'access-control': 'Data access control',
299300
watermark: 'Watermark',
300301
'audit-log': 'Audit log',
301-
'signup-restriction': 'Sign-up restriction',
302302
'signin-frequency': 'Sign-in frequency',
303303
anomaly: 'Anomaly detection',
304304
},

src/lib/features.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ export const FEATURES = {
5252
DATABASE_PERMISSION: 'Data Access Control',
5353
WATERMARK: 'Watermark',
5454
AUDIT_LOG: 'Audit Log',
55-
SIGNUP_RESTRICTION: 'Sign-up Restriction',
55+
SIGNUP_RESTRICTION: 'Self-signup restriction',
5656
SIGNIN_FREQUENCY: 'Sign-in Frequency',
5757
ANOMALY_CENTER: 'Anomaly Center',
5858

src/lib/pricing-plan.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,8 @@ const PRICING_PLANS = new Map([
5050
['BACKUP_POLICY', 'PRO'],
5151
['SECRET_VARIABLE', 'PRO'],
5252
['EXTERNAL_SECRET_MANAGER', 'ENTERPRISE'],
53-
['SSO', 'ENTERPRISE'],
53+
['SSO_BASIC', 'ENTERPRISE'],
54+
['SSO_ADVANCED', 'ENTERPRISE'],
5455
['SCIM', 'ENTERPRISE'],
5556
['2FA', 'ENTERPRISE'],
5657
['SSH_TUNNEL', 'ENTERPRISE'],

0 commit comments

Comments
 (0)