You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: resolve critical MDX compilation errors in usercube_saas docs
Fixed multiple MDX compilation errors caused by unescaped angle brackets:
- Fixed unescaped angle brackets in text (wrapped in backticks)
- Fixed malformed code blocks with proper syntax highlighting
- Fixed unclosed HTML-like tags in documentation
- Fixed JSX parsing errors with proper escaping
- Cleaned up corrupted XML examples in OData connector docs
Resolved errors in 19 files across connectors, configuration, and installation guides.
Significantly reduced build errors from ~25+ to ~8 remaining.
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <[email protected]>
__Step 2 –__ Physical path: /`agent working directory`/Runtime
52
52
53
53
__Step 3 –__ Type: http
54
54
@@ -58,15 +58,15 @@ Code attributes enclosed with `<>` need to be replaced with a custom value befor
58
58
59
59
After creation, the following settings are recommended:
60
60
61
-
-__Application Pool__ > __Identity Manager <Organization>__ > __Advanced Settings__ > __General__ > __Start Mode__ set to AlwaysRunning;
62
-
-__Application Pool__ > ```Identity Manager <Organization>``` > __Advanced Settings__ > __Process Model__ > __Idle Time-out__ (minutes) set to 0 and Load User Profile set to True;
63
-
-__Application Pool__ > __Identity Manager <Organization>__ > __Recycling__ > Regular time intervals set to 0.
61
+
-__Application Pool__ > __Identity Manager `Organization`__ > __Advanced Settings__ > __General__ > __Start Mode__ set to AlwaysRunning;
62
+
-__Application Pool__ > ```Identity Manager Organization``` > __Advanced Settings__ > __Process Model__ > __Idle Time-out__ (minutes) set to 0 and Load User Profile set to True;
63
+
-__Application Pool__ > __Identity Manager `Organization`__ > __Recycling__ > Regular time intervals set to 0.
64
64
65
65
Recycling the application pool creates a discontinuation in the connection between server and agent, which can disrupt some of Identity Manager's features such as the job scheduler. IIS already recycles the application pool at each setting change, thus Netwrix recommends not using periodic recycling.
66
66
67
67
The following is [mandatory](https://docs.microsoft.com/en-us/aspnet/core/host-and-deploy/iis/?view=aspnetcore-8.0#mandatory):
Usually, creating an IIS application pool, such as the one within which Identity Manager's server website runs, triggers the creation of a service account ```IIS APPPOOL/<apppool_name>``` (where ```<apppool_name>``` is the application pool name) known as an application pool identity. It is associated with the IIS website. This account is granted basic group membership that should enable it to access what it needs.
92
+
Usually, creating an IIS application pool, such as the one within which Identity Manager's server website runs, triggers the creation of a service account ```IIS APPPOOL/apppool_name``` (where ```apppool_name``` is the application pool name) known as an application pool identity. It is associated with the IIS website. This account is granted basic group membership that should enable it to access what it needs.
93
93
94
94
For more information about IIS identities, visit the [Microsoft Documentation](https://support.microsoft.com/en-us/help/4466942/understanding-identities-in-iis).
95
95
96
96
Building on this default behavior, the default Application Pool Identity is usually granted the necessary permissions for Identity Manager's server to operate.
97
97
98
98
Before going further, you should check the following points:
99
99
100
-
__Step 1 –__ Find the group membership of ```IIS APPPOOL\<apppool_name>```.
100
+
__Step 1 –__ Find the group membership of ```IIS APPPOOL\apppool_name```.
101
101
102
102
__Step 2 –__ Check the permissions on the working directory.
103
-
Right-click the working directory and select Security. The group section should contain one of the ```IIS APPPOOL/<apppool_name>``` groups, namely Users. And,
103
+
Right-click the working directory and select Security. The group section should contain one of the ```IIS APPPOOL/apppool_name``` groups, namely Users. And,
104
104
105
105
__Step 3 –__ If the built-in application pool identity has been created but does not have the right permissions, you can follow the steps outlined in Install the Agents section to fix it. Go back to the section to make sure that the built-in application pool identity is effectively used by Identity Manager's server IIS Website.
106
106
@@ -126,7 +126,7 @@ __Step 1 –__ Open the IIS Manager (```INETMGR.MSC```).
126
126
127
127
__Step 2 –__ Open the __Application Pools__ node underneath the machine node.
128
128
129
-
__Step 3 –__ Select the Identity ManagerAgent/<Organization> application pool.
129
+
__Step 3 –__ Select the Identity ManagerAgent/`Organization` application pool.
130
130
131
131
__Step 4 –__ Right-click and select __Advanced Settings__.
132
132
@@ -270,7 +270,7 @@ An RSA key pair, as in an [X.509](https://fr.wikipedia.org/wiki/X.509) public ke
270
270
271
271
The key pair can be generated with tools such as [OpenSSL](https://www.openssl.org/docs/manmaster/man1/req.html) or Microsoft's [New-SelfSignedCertificate](https://learn.microsoft.com/en-us/powershell/module/pki/new-selfsignedcertificate?view=windowsserver2022-ps) and [pvk2pfx tool](https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/pvk2pfx?redirectedfrom=MSDN).
272
272
273
-
Here's an example showing how to generate a [PKCS #12](https://en.wikipedia.org/wiki/PKCS_12) archive (<UsercubeContoso.pfx>) bundling a public key certificate (<IdentityManagercontoso.cert>) and a private key (<usercubecontoso.key>) with OpenSSL, with a 50-year expiration date:
273
+
Here's an example showing how to generate a [PKCS #12](https://en.wikipedia.org/wiki/PKCS_12) archive (`UsercubeContoso.pfx`) bundling a public key certificate (`Identity Manager contoso.cert`) and a private key (`usercubecontoso.key`) with OpenSSL, with a 50-year expiration date:
274
274
275
275
__Step 1 –__ Enter the following command:
276
276
@@ -347,7 +347,7 @@ Their content should be provided by the integration team, in relation to the Ope
347
347
OpenIdClient
348
348
](/docs/usercube/usercube/integration-guide/toolkit/xml-configuration/access-control/openidclient/index.md) topic for additional information.
349
349
350
-
The following example shows an appsettings.agent.json file that sets an agent to connect to Identity Manager's server (<https://usercubeserver.contoso.com>) with the OpenId client identifier <Job> and the password <secret>, stored in the OpenIdClients list which also contains the "admin/secret" login/password pair.
350
+
The following example shows an appsettings.agent.json file that sets an agent to connect to Identity Manager's server (`https://usercubeserver.contoso.com`) with the OpenId client identifier `Job` and the password `secret`, stored in the OpenIdClients list which also contains the "admin/secret" login/password pair.
351
351
352
352
Code attributes enclosed with `<>` need to be replaced with a custom value before entering the script in the command line.
Copy file name to clipboardExpand all lines: docs/usercube_saas/usercube/installation-guide/production-ready/agent/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -347,7 +347,7 @@ Their content should be provided by the integration team, in relation to the Ope
347
347
OpenIdClient
348
348
](/docs/usercube_saas/usercube/integration-guide/toolkit/xml-configuration/access-control/openidclient/index.md) topic for additional information.
349
349
350
-
The following example shows an appsettings.agent.json file that sets an agent to connect to Identity Manager's server (<https://usercubeserver.contoso.com>) with the OpenId client identifier ```<Job>``` and the password ```<secret>```, stored in the OpenIdClients list which also contains the "admin/secret" login/password pair.
350
+
The following example shows an appsettings.agent.json file that sets an agent to connect to Identity Manager's server (`https://usercubeserver.contoso.com`) with the OpenId client identifier `<Job>` and the password `<secret>`, stored in the OpenIdClients list which also contains the "admin/secret" login/password pair.
351
351
352
352
Code attributes enclosed with `<>` need to be replaced with a custom value before entering the script in the command line.
Copy file name to clipboardExpand all lines: docs/usercube_saas/usercube/integration-guide/connectors/entitypropertymapping-format/index.md
+11-4Lines changed: 11 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,12 +40,19 @@ In a given resource type, there should be scalar rules either for the bitmask pr
40
40
>
41
41
> 
Copy file name to clipboardExpand all lines: docs/usercube_saas/usercube/integration-guide/connectors/how-tos/demoapp-hr/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,6 @@ The HR Application is part of the Identity Manager SDK, and comes with prefille
26
26
27
27
The HR application is running, and the web browser is on the HR application employee list.
28
28
29
-
To set the HR application to another port, run ./HR.exe --urls http://localhost:{port number}. To access the application, enter the URL localhost:{port number} in a web browser.
29
+
To set the HR application to another port, run `./HR.exe --urls http://localhost:{port number}`. To access the application, enter the URL `localhost:{port number}` in a web browser.
30
30
31
31
Some ports are not recognized by web browsers, or may already be used. Choose a port wisely.
Copy file name to clipboardExpand all lines: docs/usercube_saas/usercube/integration-guide/connectors/references-connectors/azure/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ The identifier of the connection and thus the name of the subsection must:
78
78
| | |
79
79
| --- | --- |
80
80
| SubscriptionId required | __Type__ String __Description__ GUID that uniquely identifies the subscription associated to the ```ApplicationId```. [See how to find it](https://www.youtube.com/watch?v=6b1J03fDnOg&t=3s). |
81
-
| AzurePath default value: ```https://management.azure.com/.default``` | __Type__ String __Description__ Scope requested to access a protected API. For this flow (client credentials), the scope should be of the form __"{ResourceIdUri/.default}"__. [See Microsoft's documentation](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow#see-microsofts-documentation). |
81
+
| AzurePath default value: ```https://management.azure.com/.default``` | __Type__ String __Description__ Scope requested to access a protected API. For this flow (client credentials), the scope should be of the form __`{ResourceIdUri/.default}`__. [See Microsoft's documentation](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow#see-microsofts-documentation). |
Copy file name to clipboardExpand all lines: docs/usercube_saas/usercube/integration-guide/connectors/references-connectors/microsoftentraid/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ The table below summarizes the setting attributes of Microsoft Entra ID connecto
86
86
| TenantId (required) | String | GUID that uniquely identifies the Azure tenant. __NOTE:__ The value obtained at registration: __App registrations__ > __Owned applications__ > __Identity Manager__ > __Overview__ > __Application (tenant) ID__|
87
87
| ResponseUri (default value: ```http://localhost```) | String | URI used by Azure to contact back the application with the tokens. This response Uri needs to be registered in the [app registration](https://aka.ms/msal-net-register-app). |
88
88
| MicrosoftAuthorityPath (optional) | String | Pattern for Microsoft Authority Path. |
89
-
| MicrosoftGraphPath (default value: https://graph.microsoft.com/.default)| String | Scope requested to access a protected API. __NOTE:__ For this flow (client credentials), the scope should be of the form "{ResourceIdUri/.default}". [See Microsoft's documentation](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow#see-microsofts-documentation) for additional information. |
89
+
| MicrosoftGraphPath (default value: https://graph.microsoft.com/.default)| String | Scope requested to access a protected API. __NOTE:__ For this flow (client credentials), the scope should be of the form `{ResourceIdUri/.default}`. [See Microsoft's documentation](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow#see-microsofts-documentation) for additional information. |
90
90
| MicrosoftGraphPathApi (default value: ```https://graph.microsoft.com/v1.0/```) | String | Microsoft Graph Uri API. |
Copy file name to clipboardExpand all lines: docs/usercube_saas/usercube/integration-guide/connectors/references-connectors/odata/index.md
+13-3Lines changed: 13 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,8 +110,18 @@ The files' column headers come from the entity type mapping's ```ConnectionColum
110
110
If the connection column describes a sub-property, then the name should have the following pattern: ```{property}:{sub-property}```. The character ```":"``` should not be used in other situations.
> Note that we have here ```UserName``` which is a single property, and ```FamilyName``` which is a sub-property of ```Name```, hence the name ```Name:FamilyName``` as the ```ConnectionColumn```.
0 commit comments