Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit a8426fb

Browse files
committed
more changes from conversion
1 parent 3686fac commit a8426fb

File tree

5 files changed

+13
-43
lines changed

5 files changed

+13
-43
lines changed

sp-oncall/admin/get-started/team-dashboard.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Information Alerts can still be found on the Timeline Page.
1717

1818
.. image:: /_images/spoc/team-dashboard.png
1919
:width: 100%
20-
:alt: An image of the . On-Call individuals listed on the left; Team incidents are shown in the main pane.
20+
:alt: An image of the team dashboard On-Call individuals listed on the left; Team incidents are shown in the main pane.
2121

2222

2323
Filters
@@ -44,12 +44,12 @@ Quickly identify responsible parties during a firefight by easily seeing which p
4444
Manual Incident Creation
4545
----------------------------
4646

47-
You can create a manual incident from the by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
47+
You can create a manual incident from the team dashboard by selecting :guilabel:`Create Incident` in the top right corner. For instructions, see :ref:`manual-incident`.
4848

4949
Incident War Rooms
5050
----------------------------
5151

52-
Access Incident Details directly from the by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
52+
Access Incident Details directly from the team dashboard by selecting the incident number link. This will expand the incident and its event history in the :ref:`Incident War Room <war-room>`.
5353

5454
People Table
5555
==================

sp-oncall/admin/sso/sp-sso-adfs.rst

Lines changed: 6 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -7,45 +7,28 @@ Configure Active Directory Federation Services Single Sign-On for Splunk On-Call
77
.. meta::
88
:description: Enable Splunk On-Call SSO for Active Directory Federation Services (ADFS) your organization.
99

10-
11-
12-
1310
Requirements
1411
==================
1512

1613
This integration is compatible with the following versions of Splunk On-Call:
1714

1815
- Full-Stack
1916

20-
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are
21-
interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
22-
23-
17+
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
2418

25-
Configure Single Sign On (SSO) between your Identity Provider (IDP) and Splunk On-Call. Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will
19+
Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will
2620
complete the setup on the back-end and respond with confirmation.
2721

2822
If your IDP does not have SAML capability, please contact Splunk On-Call Support to explore what alternative options may be available. For details on how to contact Splunk On-Call Support, see :ref:`spoc-support`.
2923

30-
31-
Administrator Setup
32-
==========================
33-
34-
Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:
35-
36-
- :ref:`sso-okta-spoc`
37-
- :ref:`sso-google-spoc`
38-
- :ref:`sso-onelogin-spoc`
39-
- :ref:`sso-adfs-ac-spoc`
40-
41-
4224
.. _sso-adfs-ac-spoc:
4325

26+
Configure SSO for Active Directory Federation Services (ADFS)
27+
==============================================================
4428

45-
Active Directory Federation Services (ADFS)
46-
===========================================================
29+
To configure SSO for Splunk On-Call using ADFS complete the following steps.
4730

48-
Once you have sent over your Metadata file, and the Splunk On-Call Support team has completed the configuration, you will receive an updated metadata file to complete the configuration on your side.
31+
#. Once you have sent over your Metadata file and the Splunk On-Call Support team has completed the configuration, you will receive an updated metadata file to complete the configuration on your side.
4932

5033
#. In the ADFS Management console, navigate to :guilabel:`Trust Relationships`, then :guilabel:`Relying Party Trusts` and select :guilabel:`Add Relying Party Trust` in the :menuselection:`Actions` pane.
5134

sp-oncall/admin/sso/sp-sso-google.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Configure Single Sign-On for Splunk On-Call using Google Apps
77
.. meta::
88
:description: Enable Splunk On-Call SSO for your organization.
99

10-
To configure SSO for Splunk On-Call using Google Apps:
10+
To configure SSO for Splunk On-Call using Google Apps complete the following steps.
1111

1212
#. Access the Admin portal for Google Apps and navigate to :guilabel:`Apps` then :guilabel:`SAML Apps`.
1313

sp-oncall/admin/sso/sp-sso-okta.rst

Lines changed: 2 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,6 @@ Configure Single Sign-On for Okta and Splunk On-Call
77
.. meta::
88
:description: Enable Splunk On-Call SSO for your organization.
99

10-
11-
12-
1310
Requirements
1411
==================
1512

@@ -20,20 +17,10 @@ This integration is compatible with the following versions of Splunk On-Call:
2017
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are
2118
interested in setting up SSO, please contact :ref:`Splunk On-Call Support <spoc-support>`.
2219

23-
24-
Administrator Setup
20+
Configure SSO for Okta
2521
==========================
2622

27-
Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:
28-
29-
- :ref:`sso-okta-spoc-setup`
30-
- :ref:`sso-google-spoc`
31-
-
32-
33-
.. _sso-okta-spoc-setup:
34-
35-
Okta
36-
==========
23+
To configure SSO for Okta complete the following steps.
3724

3825
#. From the Okta user homepage, select :guilabel:`Admin` to access the Okta Admin dashboard.
3926

sp-oncall/alerts/team-escalation-policy.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Escalation policies determine set who is actually on-call for a given team and a
1111

1212
Some things to note:
1313

14-
- Only Team and Global Admins are able to make changes to Escalation Policies
14+
- Only Team and Global Admins are able to make changes to Escalation Policies.
1515
- Only users specified in the first step of an Escalation Policy will receive Timeline and Push notifications that they are on-call and will log hours in the on-call report as being on-call. If you would like users in subsequent steps of an escalation policy to receive these notifications and log these hours, see :ref:`multi-escalation-policies`.
1616
- When an Escalation Policy is executed and a user is being notified, the user's personal paging policy determines how they will be contacted. See :ref:`custom-paging-policy`.
1717

0 commit comments

Comments
 (0)