You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/aws/pro/enterprise-image.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,6 +27,7 @@ This offline functionality is enabled by:
27
27
- After the image is pushed to the customer-specific ECR repository, the customer can pull and push it to their internal Docker registry.
28
28
- Developers within the customer’s network can then pull the image from this registry.
29
29
- To use the image from the command line interface (CLI), set the `IMAGE_NAME` configuration to the name of the Enterprise image, typically using the command:
You can then deploy a LocalStack instance by storing the following file content as `localstack.yml` and applying it against the cluster via `kubectl apply -f localstack.yml`.
Copy file name to clipboardExpand all lines: src/content/docs/aws/pro/sso.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ Custom Single-Sign On (SSO) Identity providers, can be enabled to facilitate the
11
11
In order to configure SSO access, first sign in to the LocalStack Web application under [app.localstack.cloud](https://app.localstack.cloud/).
12
12
In your profile settings, navigate to the Single Sign-on tab which will list existing SSO Identity Providers (if any exist).
13
13
14
-
<imgsrc="localstack-setting-sso.png"width="800px"alt="Adding SSO Identity providers in LocalStack Settings">
14
+

15
15
16
16
Next, click the button to create a new identity provider (IdP), where you can choose between the two leading industry standards:
17
17
@@ -26,7 +26,7 @@ In the form illustrated below, you can then enter the main information for the n
26
26
- Client ID, Client Secret, Attributes request method, OIDC issues, Authorize scopes, and more.
27
27
- You should be able to find these attributes in your OIDC IdP configuration.
28
28
29
-
<imgsrc="oidc-sso.png"width="600px"alt="Configuring SSO using OpenID Connect (OIDC)">
29
+

30
30
31
31
## Configuring SSO using SAML
32
32
@@ -35,7 +35,7 @@ The SAML metadata file can be specified either via URL or via a file upload.
35
35
36
36
Select **Enable IdP sign out flow** if you want your users to be logged out from our app and your SAML IdP when they log out from your our Web Application.
37
37
38
-
<imgsrc="saml-sso.png"width="600px"alt="Configuring SSO using SAML">
38
+

39
39
40
40
## Attribute mapping
41
41
@@ -49,7 +49,7 @@ The following user attribute mappings can currently be configured:
49
49
50
50
The Email should be configured to ensure correct functionality.
## Callback URL, Sign Up Portal URL and Identifier (Entity Id)
55
55
@@ -60,7 +60,7 @@ After configuring the base details for your Identity Provider (IdP), the followi
60
60
-**Sign Up Portal URL**: This is the URL that can be shared with your users to start the SSO signup flow for the LocalStack Web Application.
61
61
The format of this endpoint is `https://app.localstack.cloud/auth/sso/<organizationId>/<ssoName>`
62
62
63
-
<imgsrc="additional-information-page.png"width="600px"alt="Callback URL, Sign Up Portal URL, and Identifier (Entity Id)">
63
+

64
64
65
65
## User Roles and Permissions
66
66
@@ -70,4 +70,5 @@ For each new member that joins your org, you can specify user roles and permissi
70
70
-**Default User Permissions**: Use this to define which permissions should be assigned to users of your organization signing up via SSO.
71
71
- Tip: In order to enable self-serve licences (i.e., allowing your users to allocate themselves their own license), make sure to select the **Allow member to issue a license for themselves (or a legacy API key)** permission.
72
72
73
-
<imgsrc="roles-permissions.png"width="600px"alt="User Roles and Permissions">
73
+
74
+

0 commit comments