Skip to content

Commit 9bcce83

Browse files
Update abstracts for accessing server assembly (#4340)
* Update abstracts for accessing server assembly * Review abstracts in Configuring user auth * Apply suggestions from style review Co-authored-by: Lena Ansorgová <[email protected]> * Reword abstracts for examples --------- Co-authored-by: Lena Ansorgová <[email protected]>
1 parent 2ce907e commit 9bcce83

File tree

28 files changed

+51
-34
lines changed

28 files changed

+51
-34
lines changed

guides/common/assembly_accessing-server.adoc renamed to guides/common/assembly_accessing-projectname-from-projectwebui.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
:_mod-docs-content-type: ASSEMBLY
22

3-
include::modules/con_accessing-server.adoc[]
3+
include::modules/con_accessing-projectname-from-projectwebui.adoc[]
44

55
include::modules/proc_logging-in-to-the-projectwebui.adoc[leveloffset=+1]
66

guides/common/assembly_configuring-kerberos-sso-with-freeipa-in-project.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
include::modules/con_configuring-kerberos-sso-with-freeipa-in-project.adoc[]
44

5-
include::modules/proc_enrolling-projectserver-in-freeipa-domain.adoc[leveloffset=+1]
5+
include::modules/proc_enrolling-projectserver-in-your-freeipa-domain.adoc[leveloffset=+1]
66

77
include::modules/proc_configuring-the-freeipa-authentication-source-on-projectserver.adoc[leveloffset=+1]
88

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
:_mod-docs-content-type: CONCEPT
2+
3+
[id="Accessing_Server_{context}"]
4+
= Accessing {ProjectName} from {ProjectWebUI}
5+
6+
[role="_abstract"]
7+
After {ProjectName} has been installed and configured, you can use a browser to log in to the {ProjectWebUI}.

guides/common/modules/con_accessing-server.adoc

Lines changed: 0 additions & 8 deletions
This file was deleted.

guides/common/modules/con_configuring-sso-and-2fa-with-keycloak-quarkus-in-project.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
= Configuring SSO and 2FA with {keycloak-quarkus} in {Project}
55

66
[role="_abstract"]
7-
{keycloak-quarkus} is an open-source identity and access management solution that provides authentication features, such as single sign-on functionality, user federation, and centralized authentication management.
8-
With {keycloak-quarkus}, you can integrate {ProjectServer} with your existing {keycloak-quarkus} server to delegate user authentication and authorization to {keycloak-quarkus}.
7+
{keycloak-quarkus} is an open-source identity and access management solution that provides various authentication features.
8+
You can integrate {ProjectServer} with your existing {keycloak-quarkus} server to delegate user authentication and authorization to {keycloak-quarkus}.
99

1010
{keycloak} users can log in using the following login methods:
1111

guides/common/modules/con_configuring-sso-and-2fa-with-keycloak-wildfly-in-project.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
= Configuring SSO and 2FA with {keycloak-wildfly} in {Project}
55

66
[role="_abstract"]
7-
{keycloak} is an open-source identity and access management solution that provides authentication features, such as single sign-on functionality, user federation, and centralized authentication management.
8-
With {keycloak-wildfly}, you can integrate {ProjectServer} with your existing {keycloak} server to delegate user authentication and authorization to {keycloak}.
7+
{keycloak} is an open source identity and access management solution that provides various authentication features.
8+
You can integrate {ProjectServer} with your existing {keycloak} server to delegate user authentication and authorization to {keycloak}.
99

1010
:FeatureName: Configuring {Project} with {keycloak-wildfly}
1111
include::snip_deprecated-feature.adoc[]

guides/common/modules/con_refreshing-external-user-groups-for-freeipa-or-ad.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,7 @@
44
= Refreshing external user groups for {FreeIPA} or AD
55

66
[role="_abstract"]
7+
If your environment includes external user groups based on {FreeIPA} or Active Directory (AD), review these guidelines for refreshing external user groups.
8+
79
External user groups based on {FreeIPA} or AD are refreshed only when a group member logs in to {Project}.
810
It is not possible to alter user membership of external user groups in the {ProjectWebUI}, such changes are overwritten on the next group refresh.

guides/common/modules/proc_configuring-a-cross-forest-trust-between-freeipa-and-active-directory-for-project.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
= Configuring a cross-forest trust between {FreeIPA} and Active Directory for {Project}
55

66
[role="_abstract"]
7-
When your {FreeIPA} deployment includes a cross-forest trust with Active Directory (AD), configure host-based access control (HBAC) and the System Security Services Daemon (SSSD) to enable AD users to log in to {Project}.
7+
If your {FreeIPA} deployment includes a cross-forest trust with Active Directory (AD), you must configure host-based access control (HBAC) and the System Security Services Daemon (SSSD) before AD users can log in to {Project}.
88

99
.Prerequisites
1010
* An existing {FreeIPA} server with a cross-forest trust with AD established.

guides/common/modules/proc_configuring-a-project-client-to-provide-hammer-cli-authentication-with-keycloak.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55

66
[role="_abstract"]
77
If you are configuring a client that will provide Hammer CLI authentication to your {Project} deployment, delegate authentication to the {keycloak} server and add {keycloak} as an external authentication source in {Project}.
8+
89
Perform these steps on the {Project} client registered to {keycloak}.
910

1011
.Prerequisites

guides/common/modules/proc_configuring-a-project-client-to-provide-projectwebui-authentication-with-keycloak.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55

66
[role="_abstract"]
77
If you are configuring a client that will provide {ProjectWebUI} authentication to your {Project} deployment, delegate authentication to the {keycloak} server and add {keycloak} as an external authentication source in {Project}.
8+
89
Perform these steps in the {ProjectWebUI}.
910

1011
.Prerequisites

0 commit comments

Comments
 (0)