Skip to content

Commit 1babb97

Browse files
committed
Merge branch 'main' of https://github.com/kinde-oss/documentation into feat/workflow-docs
2 parents aab8517 + 518a3c0 commit 1babb97

File tree

7 files changed

+25
-15
lines changed

7 files changed

+25
-15
lines changed

src/content/docs/authenticate/enterprise-connections/advanced-saml-configurations.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,8 @@ Only configure key attributes if supported by your IdP.
6262

6363
You can pass provider-specific parameters to an Identity Provider (IdP) during authentication. These are also known as 'upstream params'. The values your pass can either be static per connection or dynamic per user.
6464

65-
You can use upstream paramsto create a smoother sign in experience - by passing the email through, or to offer an account switcher (such as the Google account switcher) during sign in.
65+
You can use upstream params to create a smoother sign in experience - by passing the email through, or to offer an account switcher (such as the Google account switcher) during sign in.
6666

6767
Note that every identity provider has their own set of supported parameters and values, so you'll need to check their documentation to determine which URL parameters are supported.
68+
69+
For more information, see [Pass parameters to identity providers](/authenticate/auth-guides/pass-params-idp/).

src/content/docs/authenticate/enterprise-connections/cloudflare-saml.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,8 @@ You can make a connection available only to a specific organization, or you can
6262

6363
![ACS URL and custom domain option](https://imagedelivery.net/skPPZTHzSlcslvHjesZQcQ/885eda9c-ca4f-4340-db17-224023b8c300/public)
6464

65-
11. Copy the reply relevant URL:
66-
1. If you don't use a custom domain, copy the **Assertion customer service (ACS) URL**.
65+
11. Copy the relevant reply URL:
66+
1. If you don't use a custom domain, copy the **ACS URL**.
6767
2. If you do use a custom domain, select the **Use custom domain instead** option and copy the custom domain URL.
6868
Later, add this URL to your identity provider configuration.
6969
12. If you want to enable just-in-time (JIT) provisioning for users, select the **Create a user record in Kinde** option. This saves time adding users manually or via API later.

src/content/docs/authenticate/enterprise-connections/custom-saml-google-workspace.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ You can make a connection available only to a specific organization, or you can
6060

6161
![ACS URL and custom domain option](https://imagedelivery.net/skPPZTHzSlcslvHjesZQcQ/885eda9c-ca4f-4340-db17-224023b8c300/public)
6262

63-
11. Copy the reply relevant URL:
64-
1. If you don't use a custom domain, copy the **Assertion customer service (ACS) URL**.
63+
11. Copy the relevant reply URL:
64+
1. If you don't use a custom domain, copy the **ACS URL**.
6565
2. If you do use a custom domain, select the **Use custom domain instead** option and copy the custom domain URL.
6666
Later, add this URL to your identity provider configuration.
6767
12. If you want to enable just-in-time (JIT) provisioning for users, select the **Create a user record in Kinde** option. This saves time adding users manually or via API later.

src/content/docs/authenticate/enterprise-connections/custom-saml.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@ Depending on your SAML set up, you may need to include advanced configurations f
8282

8383
![ACS URL and custom domain option](https://imagedelivery.net/skPPZTHzSlcslvHjesZQcQ/885eda9c-ca4f-4340-db17-224023b8c300/public)
8484

85-
12. Copy the reply relevant URL:
86-
1. If you don't use a custom domain, copy the **Assertion customer service (ACS) URL**.
85+
12. Copy the relevant reply URL:
86+
1. If you don't use a custom domain, copy the **ACS URL**.
8787
2. If you do use a custom domain, select the **Use custom domain instead** option and copy the custom domain URL.
8888
Later, add this URL to your identity provider configuration.
8989
13. If you want to enable just-in-time (JIT) provisioning for users, select the **Create a user record in Kinde** option. This saves time adding users manually or via API later.

src/content/docs/authenticate/enterprise-connections/entra-id-saml.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,8 +77,8 @@ You can make a connection available only to a specific organization, or you can
7777
![SAML configuration screen](https://imagedelivery.net/skPPZTHzSlcslvHjesZQcQ/dbdccca5-2e6c-4dd8-eaec-e029574daf00/public)
7878

7979
10. If you use home realm domains, the sign in button is hidden on the auth screen by default. To show the SSO button, select the **Always show sign-in button** option.
80-
11. Copy the reply relevant URL:
81-
1. If you don't use a custom domain, copy the **Assertion customer service (ACS) URL**.
80+
11. Copy the relevant reply URL:
81+
1. If you don't use a custom domain, copy the **ACS URL**.
8282
2. If you do use a custom domain, select the **Use custom domain instead** option and copy the custom domain URL.
8383
Later, add this URL to your identity provider configuration.
8484

src/content/docs/authenticate/enterprise-connections/okta-saml-connection.mdx

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Depending on your SAML set up, you may need to include advanced configurations f
4343

4444
![Okta connection config window](https://imagedelivery.net/skPPZTHzSlcslvHjesZQcQ/a06249d4-d368-43f7-bba1-9df10d80aa00/public)
4545

46-
3. Enter the **IdP metadata URL**. This URL comes from your identity provider.
46+
3. Enter the **IdP metadata URL**. This URL comes from your identity provider. If you haven't set up your app yet, you can add this later.
4747

4848
![optional fields for saml](https://imagedelivery.net/skPPZTHzSlcslvHjesZQcQ/4f1851db-5c34-496b-ced1-07c1cd272b00/public)
4949

@@ -60,8 +60,8 @@ Depending on your SAML set up, you may need to include advanced configurations f
6060

6161
![ACS URL and custom domain option](https://imagedelivery.net/skPPZTHzSlcslvHjesZQcQ/885eda9c-ca4f-4340-db17-224023b8c300/public)
6262

63-
11. Copy the reply relevant URL:
64-
1. If you don't use a custom domain, copy the **Assertion customer service (ACS) URL**.
63+
11. Copy the relevant reply URL:
64+
1. If you don't use a custom domain, copy the **ACS URL**.
6565
2. If you do use a custom domain, select the **Use custom domain instead** option and copy the custom domain URL.
6666
Later, add this URL to your identity provider configuration.
6767
12. If you want to enable just-in-time (JIT) provisioning for users, select the **Create a user record in Kinde** option. This saves time adding users manually or via API later.
@@ -95,7 +95,7 @@ Depending on your SAML set up, you may need to include advanced configurations f
9595
3. **Name ID format:** Select **EmailAddress**.
9696
4. **Application username**: Select **Email**.
9797
5. Leave all other options to their default value and select **Next**.
98-
7. In the next screen, select **I'm a software vendor. I'd like to integrate my app with Okta**, then select **Finish**. You will be redirected to the newly created application in Okta.
98+
7. Select **Finish**. You will be redirected to the newly created application in Okta.
9999
8. Select the **Sign on** tab and copy the metadata URL.
100100

101101
![Metadata URL in Okta](https://imagedelivery.net/skPPZTHzSlcslvHjesZQcQ/9bdcb215-054e-45c1-11a7-2df2f4be7800/public)
@@ -109,3 +109,13 @@ Depending on your SAML set up, you may need to include advanced configurations f
109109
1. For environment-level connections, scroll down and select the apps that will use the auth method.
110110
2. For organization-level connections, scroll down and select if you want to switch this on for the org.
111111
5. Select **Save**. You can now use Okta as an IdP for the selected applications.
112+
113+
## Troubleshooting the connection
114+
115+
If you get an error in Okta that says **User is not assigned to this application**, it means you need to assign a user or group to your Okta application.
116+
117+
1. Go to the **Applications** section in your Okta Admin Console.
118+
2. Select the SAML 2.0 app you set up.
119+
3. Under the **Assignments** tab, click **Assign > Assign to People or Assign to Groups**.
120+
4. Choose the user or group you want to assign to this application and save your changes.
121+

src/content/docs/workflows/example-workflows/new-password-provided-workflow.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,6 @@ if (!isMinCharacters) {
9696
"Provide a password at least 50 characters long"
9797
);
9898
}
99-
10099
```
101100

102101
The field names for the widget binding in this workflow are:
@@ -112,4 +111,3 @@ See examples on GitHub:
112111

113112
- [Sync passwords to another system](https://github.com/kinde-starter-kits/workflow-examples/blob/main/newPassword/securelySyncPasswordWorkflow.ts) - Use encryption keys to securely keep passwords in sync between systems.
114113
- [Custom password validation](https://github.com/kinde-starter-kits/workflow-examples/blob/main/newPassword/customPasswordValidationWorkflow.ts) - Shows how to validate a password against your own rules.
115-

0 commit comments

Comments
 (0)