Skip to content

Commit 8a4734a

Browse files
committed
updating SMAL guide with new IAM experience
1 parent 5290a9f commit 8a4734a

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+108
-130
lines changed

pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs/guide.en-asia.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -121,15 +121,11 @@ With the mapping completed, your AD FS now trusts OVHcloud as a service provider
121121

122122
Adding your AD FS as a trusted identity provider is done in the [OVHcloud Control Panel](https://ca.ovh.com/auth/?action=gotomanager&from=https://www.ovh.com/asia/&ovhSubsidiary=asia) where you can provide the identity provider metadata.
123123

124-
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identity & Access Management`{.action}.
124+
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identities`{.action}.
125125

126126
![Access to the IAM menu](images/access_to_the_IAM_menu_01.png){.thumbnail}
127127

128-
Then click on the `Identities`{.action} tab to access local users management.
129-
130-
![Access to the IAM menu](images/access_to_the_IAM_menu_03.png){.thumbnail}
131-
132-
Click on the `SSO connection`{.action} button.
128+
Then click on the `SSO`{.action} tab and on the `SSO connection`{.action} button.
133129

134130
![OVHcloud connect SSO step 1](images/ovhcloud_user_management_connect_sso_1.png){.thumbnail}
135131

@@ -186,7 +182,7 @@ You can also verify this in the SAML assertion:
186182

187183
This means that you need to add the `manager@<my-domain>.com` group to your OVHcloud account, attaching a role to it. Otherwise, your OVHcloud account wouldn't know what is the user allowed to do.
188184

189-
Add it by clicking on the `Declare a group`{.action} button and filling in the fields:
185+
Add it on the section `Identities`{.action} and on the tab `User groups`{.action} by clicking on the `Declare a group`{.action} button and filling in the fields:
190186

191187
![AD FS user management groups](images/ovhcloud_user_management_groups_1.png){.thumbnail}
192188

pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs/guide.en-au.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,11 +121,11 @@ With the mapping completed, your AD FS now trusts OVHcloud as a service provider
121121

122122
Adding your AD FS as a trusted identity provider is done in the [OVHcloud Control Panel](https://ca.ovh.com/auth/?action=gotomanager&from=https://www.ovh.com.au/&ovhSubsidiary=au) where you can provide the identity provider metadata.
123123

124-
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identity & Access Management`{.action}.
124+
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identities`{.action}.
125125

126126
![Access to the IAM menu](images/access_to_the_IAM_menu_01.png){.thumbnail}
127127

128-
Then click on the `Identities`{.action} tab to access local users management.
128+
Then click on the `SSO`{.action} tab and on the `SSO connection`{.action} button.
129129

130130
![Access to the IAM menu](images/access_to_the_IAM_menu_03.png){.thumbnail}
131131

@@ -186,7 +186,7 @@ You can also verify this in the SAML assertion:
186186

187187
This means that you need to add the `manager@<my-domain>.com` group to your OVHcloud account, attaching a role to it. Otherwise, your OVHcloud account wouldn't know what is the user allowed to do.
188188

189-
Add it by clicking on the `Declare a group`{.action} button and filling in the fields:
189+
Add it on the section `Identities`{.action} and on the tab `User groups`{.action} by clicking on the `Declare a group`{.action} button and filling in the fields:
190190

191191
![AD FS user management groups](images/ovhcloud_user_management_groups_1.png){.thumbnail}
192192

pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs/guide.en-ca.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,11 +121,11 @@ With the mapping completed, your AD FS now trusts OVHcloud as a service provider
121121

122122
Adding your AD FS as a trusted identity provider is done in the [OVHcloud Control Panel](https://ca.ovh.com/auth/?action=gotomanager&from=https://www.ovh.com/ca/en/&ovhSubsidiary=ca) where you can provide the identity provider metadata.
123123

124-
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identity & Access Management`{.action}.
124+
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identities`{.action}.
125125

126126
![Access to the IAM menu](images/access_to_the_IAM_menu_01.png){.thumbnail}
127127

128-
Then click on the `Identities`{.action} tab to access local users management.
128+
Then click on the `SSO`{.action} tab and on the `SSO connection`{.action} button.
129129

130130
![Access to the IAM menu](images/access_to_the_IAM_menu_03.png){.thumbnail}
131131

@@ -186,7 +186,7 @@ You can also verify this in the SAML assertion:
186186

187187
This means that you need to add the `manager@<my-domain>.com` group to your OVHcloud account, attaching a role to it. Otherwise, your OVHcloud account wouldn't know what is the user allowed to do.
188188

189-
Add it by clicking on the `Declare a group`{.action} button and filling in the fields:
189+
Add it on the section `Identities`{.action} and on the tab `User groups`{.action} by clicking on the `Declare a group`{.action} button and filling in the fields:
190190

191191
![AD FS user management groups](images/ovhcloud_user_management_groups_1.png){.thumbnail}
192192

pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs/guide.en-gb.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,11 +121,11 @@ With the mapping completed, your AD FS now trusts OVHcloud as a service provider
121121

122122
Adding your AD FS as a trusted identity provider is done in the [OVHcloud Control Panel](https://www.ovh.com/auth/?action=gotomanager&from=https://www.ovh.co.uk/&ovhSubsidiary=GB) where you can provide the identity provider metadata.
123123

124-
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identity & Access Management`{.action}.
124+
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identities`{.action}.
125125

126126
![Access to the IAM menu](images/access_to_the_IAM_menu_01.png){.thumbnail}
127127

128-
Then click on the `Identities`{.action} tab to access local users management.
128+
Then click on the `SSO`{.action} tab and on the `SSO connection`{.action} button.
129129

130130
![Access to the IAM menu](images/access_to_the_IAM_menu_03.png){.thumbnail}
131131

@@ -186,7 +186,7 @@ You can also verify this in the SAML assertion:
186186

187187
This means that you need to add the `manager@<my-domain>.com` group to your OVHcloud account, attaching a role to it. Otherwise, your OVHcloud account wouldn't know what is the user allowed to do.
188188

189-
Add it by clicking on the `Declare a group`{.action} button and filling in the fields:
189+
Add it on the section `Identities`{.action} and on the tab `User groups`{.action} by clicking on the `Declare a group`{.action} button and filling in the fields:
190190

191191
![AD FS user management groups](images/ovhcloud_user_management_groups_1.png){.thumbnail}
192192

pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs/guide.en-ie.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,11 +121,11 @@ With the mapping completed, your AD FS now trusts OVHcloud as a service provider
121121

122122
Adding your AD FS as a trusted identity provider is done in the [OVHcloud Control Panel](https://www.ovh.com/auth/?action=gotomanager&from=https://www.ovh.ie/&ovhSubsidiary=ie) where you can provide the identity provider metadata.
123123

124-
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identity & Access Management`{.action}.
124+
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identities`{.action}.
125125

126126
![Access to the IAM menu](images/access_to_the_IAM_menu_01.png){.thumbnail}
127127

128-
Then click on the `Identities`{.action} tab to access local users management.
128+
Then click on the `SSO`{.action} tab and on the `SSO connection`{.action} button.
129129

130130
![Access to the IAM menu](images/access_to_the_IAM_menu_03.png){.thumbnail}
131131

@@ -186,7 +186,7 @@ You can also verify this in the SAML assertion:
186186

187187
This means that you need to add the `manager@<my-domain>.com` group to your OVHcloud account, attaching a role to it. Otherwise, your OVHcloud account wouldn't know what is the user allowed to do.
188188

189-
Add it by clicking on the `Declare a group`{.action} button and filling in the fields:
189+
Add it on the section `Identities`{.action} and on the tab `User groups`{.action} by clicking on the `Declare a group`{.action} button and filling in the fields:
190190

191191
![AD FS user management groups](images/ovhcloud_user_management_groups_1.png){.thumbnail}
192192

pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs/guide.en-sg.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,11 +121,11 @@ With the mapping completed, your AD FS now trusts OVHcloud as a service provider
121121

122122
Adding your AD FS as a trusted identity provider is done in the [OVHcloud Control Panel](https://ca.ovh.com/auth/?action=gotomanager&from=https://www.ovh.com/sg/&ovhSubsidiary=sg) where you can provide the identity provider metadata.
123123

124-
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identity & Access Management`{.action}.
124+
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identities`{.action}.
125125

126126
![Access to the IAM menu](images/access_to_the_IAM_menu_01.png){.thumbnail}
127127

128-
Then click on the `Identities`{.action} tab to access local users management.
128+
Then click on the `SSO`{.action} tab and on the `SSO connection`{.action} button.
129129

130130
![Access to the IAM menu](images/access_to_the_IAM_menu_03.png){.thumbnail}
131131

@@ -186,7 +186,7 @@ You can also verify this in the SAML assertion:
186186

187187
This means that you need to add the `manager@<my-domain>.com` group to your OVHcloud account, attaching a role to it. Otherwise, your OVHcloud account wouldn't know what is the user allowed to do.
188188

189-
Add it by clicking on the `Declare a group`{.action} button and filling in the fields:
189+
Add it on the section `Identities`{.action} and on the tab `User groups`{.action} by clicking on the `Declare a group`{.action} button and filling in the fields:
190190

191191
![AD FS user management groups](images/ovhcloud_user_management_groups_1.png){.thumbnail}
192192

pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs/guide.en-us.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,11 +121,11 @@ With the mapping completed, your AD FS now trusts OVHcloud as a service provider
121121

122122
Adding your AD FS as a trusted identity provider is done in the [OVHcloud Control Panel](https://ca.ovh.com/auth/?action=gotomanager&from=https://www.ovh.com/world/&ovhSubsidiary=we) where you can provide the identity provider metadata.
123123

124-
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identity & Access Management`{.action}.
124+
On the sidebar, click on `Identity, Security & Operations`{.action} then `Identities`{.action}.
125125

126126
![Access to the IAM menu](images/access_to_the_IAM_menu_01.png){.thumbnail}
127127

128-
Then click on the `Identities`{.action} tab to access local users management.
128+
Then click on the `SSO`{.action} tab and on the `SSO connection`{.action} button.
129129

130130
![Access to the IAM menu](images/access_to_the_IAM_menu_03.png){.thumbnail}
131131

@@ -186,7 +186,7 @@ You can also verify this in the SAML assertion:
186186

187187
This means that you need to add the `manager@<my-domain>.com` group to your OVHcloud account, attaching a role to it. Otherwise, your OVHcloud account wouldn't know what is the user allowed to do.
188188

189-
Add it by clicking on the `Declare a group`{.action} button and filling in the fields:
189+
Add it on the section `Identities`{.action} and on the tab `User groups`{.action} by clicking on the `Declare a group`{.action} button and filling in the fields:
190190

191191
![AD FS user management groups](images/ovhcloud_user_management_groups_1.png){.thumbnail}
192192

pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs/guide.fr-ca.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,11 +121,11 @@ Une fois le tableau de correspondances terminé, votre service AD FS fait désor
121121

122122
L'ajout de votre AD FS en tant que fournisseur d'identité de confiance s'effectue dans [l'espace client OVHcloud](https://ca.ovh.com/auth/?action=gotomanager&from=https://www.ovh.com/ca/fr/&ovhSubsidiary=qc) où vous pouvez fournir les métadonnées du fournisseur d'identité.
123123

124-
Dans la barre latérale, cliquez sur `Identité, Sécurité & Opérations`{.action} puis sur `Identity & Access Management`{.action}.
124+
Dans la barre latérale, cliquez sur `Identité, Sécurité & Opérations`{.action} puis sur `Identitées`{.action}.
125125

126126
![Accès au menu IAM](images/access_to_the_IAM_menu_01.png){.thumbnail}
127127

128-
Cliquez ensuite sur l'onglet `Identités`{.action} pour accéder à la gestion des utilisateurs locaux.
128+
Cliquez ensuite sur l'onglet `SSO`{.action}. et le bouton `Connexion SSO`{.action}.
129129

130130
![Accès au menu IAM](images/access_to_the_IAM_menu_03.png){.thumbnail}
131131

@@ -186,7 +186,7 @@ Vous pouvez également le vérifier dans l'assertion SAML :
186186

187187
Cela signifie que vous devez ajouter le groupe `manager@<my-domain>.com` à votre compte OVHcloud en y attachant un rôle. Dans le cas contraire, votre compte OVHcloud ne sait pas ce que l'utilisateur est autorisé à faire.
188188

189-
Ajoutez-le en cliquant sur le bouton `Déclarer un groupe`{.action} et en remplissant les champs :
189+
Ajoutez-le dans la section `Identitées`{.action} et dans l'onglet `Groupes d'utilisateurs`{.action} en cliquant sur le bouton `Déclarer un groupe`{.action} et en remplissant les champs :
190190

191191
![Groupes de gestion des utilisateurs AD FS](images/ovhcloud_user_management_groups_1.png){.thumbnail}
192192

pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs/guide.fr-fr.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -121,18 +121,14 @@ Une fois le tableau de correspondances terminé, votre service AD FS fait désor
121121

122122
L'ajout de votre AD FS en tant que fournisseur d'identité de confiance s'effectue dans [l'espace client OVHcloud](https://www.ovh.com/auth/?action=gotomanager&from=https://www.ovh.com/fr/&ovhSubsidiary=fr) où vous pouvez fournir les métadonnées du fournisseur d'identité.
123123

124-
Dans la barre latérale, cliquez sur `Identité, Sécurité & Opérations`{.action} puis sur `Identity & Access Management`{.action}.
124+
Dans la barre latérale, cliquez sur `Identité, Sécurité & Opérations`{.action} puis sur `Identitées`{.action}.
125125

126126
![Accès au menu IAM](images/access_to_the_IAM_menu_01.png){.thumbnail}
127127

128-
Cliquez ensuite sur l'onglet `Identités`{.action} pour accéder à la gestion des utilisateurs locaux.
128+
Cliquez ensuite sur l'onglet `SSO`{.action}. et le bouton `Connexion SSO`{.action}.
129129

130130
![Accès au menu IAM](images/access_to_the_IAM_menu_03.png){.thumbnail}
131131

132-
Cliquez sur le bouton `Connexion SSO`{.action}.
133-
134-
![OVHcloud connexion SSO étape 1](images/ovhcloud_user_management_connect_sso_1.png){.thumbnail}
135-
136132
Renseignez les métadonnées XML de votre service AD FS. Le champ `Nom d'attribut de groupe` est facultatif dans ce cas. Cliquez sur `Confirmer`{.action}.
137133

138134
Il est possible de conserver les utilisateurs locaux en cochant la case `Conserver les utilisateurs OVHcloud actifs`.
@@ -186,7 +182,7 @@ Vous pouvez également le vérifier dans l'assertion SAML :
186182

187183
Cela signifie que vous devez ajouter le groupe `manager@<my-domain>.com` à votre compte OVHcloud en y attachant un rôle. Dans le cas contraire, votre compte OVHcloud ne sait pas ce que l'utilisateur est autorisé à faire.
188184

189-
Ajoutez-le en cliquant sur le bouton `Déclarer un groupe`{.action} et en remplissant les champs :
185+
Ajoutez-le dans la section `Identitées`{.action} et dans l'onglet `Groupes d'utilisateurs`{.action} en cliquant sur le bouton `Déclarer un groupe`{.action} et en remplissant les champs :
190186

191187
![Groupes de gestion des utilisateurs AD FS](images/ovhcloud_user_management_groups_1.png){.thumbnail}
192188

Loading

0 commit comments

Comments
 (0)