Skip to content

Commit f5549ed

Browse files
Fix typos
1 parent 59d08f0 commit f5549ed

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

content/manuals/security/for-admins/provisioning/group-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ Once complete, a user who signs in to Docker through SSO is automatically added
174174
175175
## More resources
176176

177-
The following videos demonstrate how to use group mapping with your IdP with SCIM enabled.
177+
The following videos demonstrate how to use group mapping with your IdP with SCIM enabled:
178178

179179
- [Video: Group mapping with Okta](https://youtu.be/c56YECO4YP4?feature=shared&t=3023)
180180
- [Video: Attribute and group mapping with Entra ID (Azure)](https://youtu.be/bGquA8qR9jU?feature=shared&t=2039)

content/manuals/security/for-admins/provisioning/just-in-time.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ title: Just-in-Time provisioning
55
linkTitle: Just-in-Time
66
---
77

8-
Just-in-Time (JIT) provisioning automatically creates and updates user accounts after every successful single sign-on (SSO) sign-in. JIT verifies that the user signing in is a member of the organization and teams that they are assigned to in your identity provider (IdP). When you [create your SSO connection](../single-sign-on/_index.md), JIT provisioning is turned on by default.
8+
Just-in-Time (JIT) provisioning automatically creates and updates user accounts after every successful single sign-on (SSO) authentication. JIT verifies that the user signing in belongs to the organization and the teams assigned to them in your identity provider (IdP). When you [create your SSO connection](../single-sign-on/_index.md), JIT provisioning is turned on by default.
99

1010
## SSO authentication with JIT provisioning enabled
1111

12-
When a user signs in with SSO and JIT provisioning is enabled, the following steps occur automatically:
12+
When a user signs in with SSO and your SSO configuration has JIT provisioning enabled, the following steps occur automatically:
1313

1414
1. The system checks if a Docker account exists for the user's email address.
1515

@@ -56,7 +56,7 @@ The following graphic provides an overview of SSO authentication with JIT disabl
5656

5757
> [!WARNING]
5858
>
59-
> Disabling JIT provisioning may disrupt your users' access and workflows. With JIT disabled, users will not be automatically added to your organization. Users must already be a member of the organization or have a pending invitation to successfully sign in through SSO.To auto-provision users with JIT disabled, [use SCIM](./scim.md).
59+
> Disabling JIT provisioning may disrupt your users' access and workflows. With JIT disabled, users will not be automatically added to your organization. Users must already be a member of the organization or have a pending invitation to successfully sign in through SSO. To auto-provision users with JIT disabled, [use SCIM](./scim.md).
6060
6161
You may want to disable JIT provisioning for reasons such as the following:
6262

content/manuals/security/for-admins/provisioning/scim.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,7 @@ If SCIM is disabled, any user provisioned through SCIM will remain in the organi
256256
257257
## More resources
258258
259-
The following videos demonstrate how to configure SCIM for your IdP.
259+
The following videos demonstrate how to configure SCIM for your IdP:
260260
261261
- [Video: Configure SCIM with Okta](https://youtu.be/c56YECO4YP4?feature=shared&t=1314)
262262
- [Video: Attribute mapping with Okta](https://youtu.be/c56YECO4YP4?feature=shared&t=1998)

0 commit comments

Comments
 (0)