Skip to content

Commit 8dcb8b5

Browse files
committed
Fix references to environment
1 parent 65eede1 commit 8dcb8b5

File tree

2 files changed

+48
-9
lines changed

2 files changed

+48
-9
lines changed
43.1 KB
Loading

umbraco-cloud/begin-your-cloud-journey/the-cloud-portal/login-providers/README.md

Lines changed: 48 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -108,14 +108,11 @@ Keep the configuration for your login provider open, as you will come back to it
108108
4. Fill out the fields.
109109
- [Learn how to fill out the form](#how-to-fill-in-the-external-login-provider-configuration).
110110

111-
<figure><img src="../../../.gitbook/assets/Screenshot 2025-01-14 103502.png" alt=""><figcaption></figcaption></figure>
111+
<figure><img src="../../../.gitbook/assets/organization-external-login-provider-configuration.png" alt=""><figcaption></figcaption></figure>
112112

113-
{% hint style="info" %}
114-
The **alias** must be unique across different login providers in the same environment.
115-
{% endhint %}
116113

117114
6. Click **Create** to add the new configuration.
118-
7. Select **Redirect URIs**.
115+
7. Click on **Sign-in and Redirect Urls**.
119116
8. Take note of the Redirect URI.
120117
9. Head back to the configuration for your external login provider.
121118

@@ -130,15 +127,15 @@ The **alias** must be unique across different login providers in the same enviro
130127
2. ID tokens (used for implicit and hybrid flows)
131128
6) Click **Configure** to complete the configuration.
132129

133-
<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdXI0M1HS5q9WCtLM15joakZD2ZmmwKgtkgRB9yeOfUMPhs61ZmitPoO5DRgD369Z-O6UDVwjhp5_rng3l1LHGgSpPXzD_2kOcTwxftkMRzB27bL67c8nRbmS9gdJNDlnVCVdHb_Q?key=SHa73yR2OEmkQib9bmYUbpLC" alt=""><figcaption></figcaption></figure>
130+
134131
{% endtab %}
135132

136133
{% tab title="Auth0" %}
137134
1. Navigate to the **Settings** section.
138135
2. Scroll down to find the **Application URIs**.
139136
3. Add the Redirect URI to the **Allowed Callback URLs**.
140137

141-
![Add the Redirect URI to the Allowed Callback URLs](../../build-and-customize-your-solution/set-up-your-project/project-settings/images/elp-oauth-4.png)
138+
![Add the Redirect URI to the Allowed Callback URLs](../../../build-and-customize-your-solution/set-up-your-project/project-settings/images/elp-oauth-4.png)
142139

143140
13. Add more Redirect URIs if needed.
144141
{% endtab %}
@@ -152,6 +149,48 @@ The **alias** must be unique across different login providers in the same enviro
152149
{% endtabs %}
153150

154151
### How to fill in the External Login Provider Configuration
152+
Learn about what type of data and information you need for each field in the configuration form.
153+
154+
**Display Name**
155+
156+
A Friendly name for the Login Provider
157+
158+
**Alias (required)**
159+
160+
A unique alias for the provider in the Organization.
161+
Use only lower-case.
162+
Spaces are not allowed.
163+
164+
**Client Id (required)**
165+
166+
A unique Client ID generated in the external login provider.Entra ID: Guid<br>Auth0: Random characters<br>Google: <code>{randomchars}.apps.googleusercontent.com</code>
167+
168+
169+
**Client Secret (required)**
170+
171+
A secret that is generated in the External Login Provider and is associated with the Client Id.
172+
173+
174+
**Authority (required)**
175+
176+
The URL for the External Login Provider. This can be found in the External Login Provider.
177+
178+
179+
Entra ID: <code>https://login.microsoftonline.com/&#x3C;Directory (tenant)></code><br>Auth0: <code>https://{accountId}.uk.auth0.com</code><br>Google: <code>https://accounts.google.com</code>
180+
181+
182+
**Metadata Address**
183+
184+
If you need a special metadata address for your External Login Provider, you can set it here. By default, the system will resolve the metadata address from the Authority Url, which is why this property is optional.
185+
186+
A common scenario for using a special metadata address is when working with Entra ID and configuring claims mapping. In this case, you must set the metadata address to the following:<code>https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration?appid={client-id}</code>
187+
188+
**User Mapping Claim Name**
189+
190+
Your provider may assign users to specific roles (For example: Admin, Editor, Viewer).<br><br>The <strong>User Group Claim Name</strong> is the field in the authentication token (claim) that identifies these roles. The system reads this claim to determine a user’s permissions.
191+
192+
Example: If your provider sends roles in a claim named <code>user_roles</code>, you would set the <strong>User Group Claim Name</strong> to <code>user_roles</code> so the system can properly recognize user permissions.
193+
155194

156195

157196
## Project Configurations
@@ -203,8 +242,8 @@ There is audit log for each Login Provider. Keep in mind that if you remove the
203242

204243
We are listing the following types of audit:
205244

206-
| Type | Sub- Type | Description |
207-
|---|---|
245+
| Type | Sub-Type | Description |
246+
|---|---|---|
208247
| User Sign-ins | - | See information about Project Permissions evaluated at the Sign-in. |
209248
| External Login Providers | Added and Updated | Entries includes the changed properties. The Client Secret is always redacted. |
210249
| Project Configuration | Added, Updated and Deleted | Shows information on the changed properties and stored Role mapping options |

0 commit comments

Comments
 (0)