You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/segment-app/iam/scim.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ To set up SCIM, you must first create an SSO connection. Once you [create your S
15
15
16
16
## Configuration Instructions
17
17
18
-
Segment officially supports [Okta](#okta-set-up-guide), [Azure AD](#azure-ad-set-up-guide), and [OneLogin](#oneLogin-set-up-guide). Each link includes specific set up instructions for that IdP. You should read the [features](#features) section of this page to understand which features of SCIM Segment supports.
18
+
Segment officially supports [Okta](#okta-set-up-guide), [Microsoft Entra ID](#microsoft-entra-id-set-up-guide), and [OneLogin](#onelogin-set-up-guide). Each link includes specific set up instructions for that IdP. You should read the [features](#features) section of this page to understand which features of SCIM Segment supports.
19
19
20
20
You may still be able to use SCIM with another Identity Provider (IdP) by adapting the following instructions.
21
21
@@ -109,13 +109,13 @@ For example, you might map `{firstName} {lastName}` from your IdP to `displayNam
109
109
110
110

111
111
112
-
## Azure AD Set up Guide
112
+
## Microsoft Entra ID setup guide
113
113
114
-
Instructions for configuring Azure AD can be found on the Microsoft Docs website.
114
+
Instructions for configuring Microsoft Entra ID can be found on the Microsoft Docs website.
115
115
116
-
1.[Complete the Azure AD Set up Guide for SSO](https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/segment-tutorial){:target="_blank”}.
116
+
1.[Complete the Microsoft Entra ID setup guide for SSO](https://learn.microsoft.com/en-us/entra/identity/saas-apps/segment-tutorial)
117
117
118
-
2.[Complete the Azure AD Set up Guide for SCIM](https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/segment-provisioning-tutorial){:target="_blank”}.
118
+
2.[Complete the Microsoft Entra ID setup guide for SCIM](https://learn.microsoft.com/en-us/entra/identity/saas-apps/segment-provisioning-tutorial)
Copy file name to clipboardExpand all lines: src/segment-app/iam/sso.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ The Segment login page can only be connected to one workspace. To use your IdP w
16
16
## Set up — SAML
17
17
18
18
Segment's SSO configuration is entirely self-service. Additionally, Segment has prebuilt connections with [Okta](https://www.okta.com/integrations/segment/){:target="_blank"}
19
-
, [OneLogin](https://www.onelogin.com){:target="_blank"}, and [Azure AD](https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/segment-tutorial){:target="_blank"}
19
+
, [OneLogin](https://www.onelogin.com){:target="_blank"}, and [Microsoft Entra ID](https://learn.microsoft.com/en-us/entra/identity/saas-apps/segment-tutorial){:target="_blank"}
20
20
which can help you get set up faster. [Reach out to support](https://segment.com/help/contact/){:target="_blank"} if you run into any questions or issues.
21
21
22
22
To get started, go to your workspace settings and navigate to **Authentication > Connections > Add new Connection**. Follow the steps to create a SAML connection.
@@ -27,7 +27,7 @@ To get started, go to your workspace settings and navigate to **Authentication >
27
27
28
28
## Prepare your IdP for the connection.
29
29
30
-
Segment officially supports apps for Okta, Azure AD, and OneLogin. Next, find Segment in your IdP's app catalog, and follow the set up instructions they provide.
30
+
Segment officially supports apps for Okta, Microsoft Entra ID, and OneLogin. Next, find Segment in your IdP's app catalog, and follow the set up instructions they provide.
31
31
32
32
If you're using a different IdP, you must create a custom SAML-based application.
33
33
@@ -181,4 +181,4 @@ Workspace owners can invite additional owners with any domain using the traditio
181
181
{% faqitem How do I configure SSO to access multiple workspaces? %}
182
182
To use SSO for multiple workspaces, your admin must configure access to each workspace as a separate app in your identity provider.
0 commit comments