Skip to content

Commit 14aa1b3

Browse files
author
Dan Costello
committed
Remove references to support email
1 parent 0796817 commit 14aa1b3

File tree

27 files changed

+284
-275
lines changed

27 files changed

+284
-275
lines changed

content/docs/guides/(authentication)/authentication-introduction.mdx

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,13 @@ title: "Introduction"
33
slug: "introduction-1"
44
excerpt: "What is UserClouds Authentication, and why use it?"
55
hidden: false
6-
metadata:
7-
image: []
8-
robots: "index"
6+
metadata:
7+
image: []
8+
robots: "index"
99
createdAt: "Thu Aug 03 2023 22:34:20 GMT+0000 (Coordinated Universal Time)"
1010
updatedAt: "Thu Aug 03 2023 23:58:35 GMT+0000 (Coordinated Universal Time)"
1111
---
12+
1213
UserClouds Authentication is a resilient, privacy-aware login provider that supports simultaneous use of multiple identity providers.
1314

1415
Unlike other login providers, UserClouds offers:
@@ -22,5 +23,3 @@ This documentation shows you how to:
2223
- Create an application with authentication by UserClouds in less than 5 minutes
2324
- Set up and customize UserClouds for your own application
2425
- Add to UserClouds your software, with zero downtime
25-
26-
If your question isn’t answered here, don’t hesitate to ping us at [[email protected]](mailto:[email protected]).

content/docs/guides/(authentication)/how-to-guides/authentication-methods.mdx

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,13 @@ title: "Add social login"
33
slug: "authentication-methods"
44
excerpt: ""
55
hidden: false
6-
metadata:
7-
image: []
8-
robots: "index"
6+
metadata:
7+
image: []
8+
robots: "index"
99
createdAt: "Thu Aug 03 2023 22:51:23 GMT+0000 (Coordinated Universal Time)"
1010
updatedAt: "Fri Aug 25 2023 21:43:12 GMT+0000 (Coordinated Universal Time)"
1111
---
12+
1213
UserClouds supports every major method of authentication, such as social sign in with Google, Facebook and LinkedIn OAuth. The user's accounts will be owned by the Identity Platforms configured in “Underlying Identity Providers”.
1314

1415
Adding a Social/Third Party Connections to a login flow can be completed in three steps:
@@ -41,8 +42,4 @@ Now your tenant is connected to the third party, you can add their authenticatio
4142
1. Navigate to the Application page (Select Tenant > Authentication > Application)
4243
2. Create social redirect and logout URIs for that application, e.g. `https://tenantname.tenant.userclouds.com/social/callback`
4344
3. Add these URIs to your account with the third party (see links in part 1)
44-
4. Select which authentication methods are enabled in the Login Settings card. You can also configure other authentication methods, like Passwordless / Magic Link, from this card.
45-
46-
## Setting up SAML SSO for your tenant
47-
48-
_Docs coming soon! For help setting up SAML SSO with UserClouds, please reach out to [[email protected]](mailto:[email protected])._
45+
4. Select which authentication methods are enabled in the Login Settings card. You can also configure other authentication methods, like Passwordless / Magic Link, from this card.

content/docs/guides/(authentication)/how-to-guides/domains.mdx

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,11 @@ title: "Set up a custom domain"
33
slug: "domains"
44
excerpt: ""
55
hidden: false
6-
metadata:
7-
image: []
8-
robots: "index"
6+
metadata:
7+
image: []
8+
robots: "index"
99
createdAt: "Thu Aug 03 2023 23:00:03 GMT+0000 (Coordinated Universal Time)"
1010
updatedAt: "Fri Aug 25 2023 21:45:22 GMT+0000 (Coordinated Universal Time)"
1111
---
12-
The default login URL for UserClouds apps is `tenantname.tenant.userclouds.com`. You can replace this with a URL you own in the Authentication Page.
1312

14-
_Docs coming soon! To customize your UserClouds domain, please reach out to [[email protected]](mailto:info@userclouds.com)._
13+
The default login URL for UserClouds apps is `tenantname.tenant.userclouds.com`. You can replace this with a URL you own in the Authentication Page.

content/docs/guides/(authentication)/how-to-guides/migrate-from-auth0.mdx

Lines changed: 85 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -6,53 +6,57 @@ hidden: false
66
createdAt: "Thu Aug 03 2023 22:50:04 GMT+0000 (Coordinated Universal Time)"
77
updatedAt: "Thu Jun 06 2024 17:05:49 GMT+0000 (Coordinated Universal Time)"
88
---
9-
import { Step, Steps } from 'fumadocs-ui/components/steps';
9+
10+
import { Step, Steps } from "fumadocs-ui/components/steps";
1011

1112
This article details how to use UserClouds to migrate off Auth0 in a few easy steps. It will show you how to migrate 100% of your usernames, profiles, passwords and other login factors off Auth0, without forcing any password resets.
1213

1314
The process should take around 15 minutes to set up. You may then have to wait a few weeks for Auth0 to comply with your ticket request (see step 6). During this time, user profile data will be migrated over in bulk. Users will log in through UserClouds, with UserClouds using Auth0 as an identity provider. When users successfully log in, their credentials will be stored in the UserClouds User Store. As such, the two databases will converge for active users. After a few weeks, Auth0 will provide a static export of your hashed passwords for inactive users, which you can then upload to UserClouds. At this point, you will have successfully migrated all of your user data off Auth0.
1415

15-
The article assumes you have already set up an account, organization, tenant and application in UserClouds. See here for more info.
16+
The article assumes you have already set up an account, organization, tenant and application in UserClouds. See here for more info.
1617

18+
## Ready your Auth0 account
1719

18-
## Ready your Auth0 account
1920
<Steps>
2021
<Step>
21-
### Create an M2M application in Auth0
22+
### Create an M2M application in Auth0
2223

23-
First, you need to create an M2M application in Auth0, so that UserClouds's server can call the Auth0 server:
24+
First, you need to create an M2M application in Auth0, so that UserClouds's server can call the Auth0 server:
2425

25-
- Log into Auth0 & click Applications in the sidebar
26-
- Click Create Application.
27-
- Call your application something like UserClouds Management App
28-
- Select M2M and hit Create
26+
- Log into Auth0 & click Applications in the sidebar
27+
- Click Create Application.
28+
- Call your application something like UserClouds Management App
29+
- Select M2M and hit Create
2930

30-
- You will be prompted to define permissions. For development purposes, select All and click Authorize. You will be able to narrow this feature set down later - the permissions you allow will depend on the UC feature set that you use.
31-
</Step>
32-
<Step>
33-
### Allow Password Grant Flow
31+
- You will be prompted to define permissions. For development purposes, select All and click Authorize. You will be able to narrow this feature set down later - the permissions you allow will depend on the UC feature set that you use.
32+
</Step>
3433

35-
Next, you need to allow the password grant flow in Auth0. This will let UserClouds capture passwords directly from your end users and verify those passwords with Auth0, rather than redirecting the users themselves to Auth0. This is required to capture any authentication changes for your active users, like new account creations and password resets.
34+
<Step>
3635

37-
- In Auth0, navigate to your new M2M app’s settings page
38-
- Click the Settings sub-tab, scroll to the Advanced Settings card and click the Grant Types tab
39-
- Enable the Password Grant Flow and click Save
40-
</Step>
41-
<Step>
42-
### Configure API Authorization in Auth0
36+
### Allow Password Grant Flow
4337

44-
These steps assume you use the default database in Auth0. If you use a custom database, and it's not clear how to adapt these steps for that database, contact us at [[email protected].](mailto:[email protected].)
38+
Next, you need to allow the password grant flow in Auth0. This will let UserClouds capture passwords directly from your end users and verify those passwords with Auth0, rather than redirecting the users themselves to Auth0. This is required to capture any authentication changes for your active users, like new account creations and password resets.
4539

46-
- Select Settings in the Auth0 Sidebar, and scroll to the API Authorization Settings Card
47-
- Copy Username-Password-Authentication into the Default Directory field and click Save
40+
- In Auth0, navigate to your new M2M app’s settings page
41+
- Click the Settings sub-tab, scroll to the Advanced Settings card and click the Grant Types tab
42+
- Enable the Password Grant Flow and click Save
43+
</Step>
44+
<Step>
4845

49-
</Step>
46+
### Configure API Authorization in Auth0
47+
48+
These steps assume you use the default database in Auth0.
49+
50+
- Select Settings in the Auth0 Sidebar, and scroll to the API Authorization Settings Card
51+
- Copy Username-Password-Authentication into the Default Directory field and click Save
52+
53+
</Step>
5054
</Steps>
5155

5256
## Configure Auth0 as an Identity Provider in UserClouds
57+
5358
<Steps>
5459
<Step>
55-
5660
### Create a new Identity Provider in UserClouds
5761

5862
- In a new tab, go to the UserClouds Console and select your tenant
@@ -63,7 +67,7 @@ The article assumes you have already set up an account, organization, tenant and
6367
### Change your provider type to Auth0
6468

6569
- Select the provider you just created
66-
- Rename the provider something like Auth0 App Connection
70+
- Rename the provider something like Auth0 App Connection
6771
Change the type to Auth0
6872
</Step>
6973
<Step>
@@ -78,81 +82,81 @@ The article assumes you have already set up an account, organization, tenant and
7882
</Steps>
7983

8084
## Import your Auth0 applications to UserClouds
85+
8186
<Steps>
82-
<Step>
83-
### Import your applications
84-
- In the same UserClouds page, scroll to the bottom card Import from Auth0 and click Import from Auth0
85-
- This will import your Auth0 app configurations (like Client ID/Secret and Login URIs) into UserClouds
86-
- The sync may take a moment - so refresh your page if you don't see any feedback immediately
87-
</Step>
88-
<Step>
89-
### Review your application configurations
90-
91-
- Next, it's beneficial to check your Auth0 configurations have successfully replicated in UserClouds, since you may be using an advanced configuration setting that UserClouds does not support migration for yet.
92-
- Navigate to each UserClouds Application's page (UserClouds > Authentication > Login Application) and review the settings
93-
- _If you are concerned your settings have not successfully ported over, please email [[email protected]](mailto:[email protected])_
94-
</Step>
95-
<Step>
96-
## Make Auth0 your active provider
97-
98-
- In UserClouds, navigate to the Authentication Page
99-
- Scroll to the Identity Platforms: Migrations & Back-Ups card
100-
- Set Auth0 to active provider and click Save
101-
102-
At this point, UserClouds will begin syncing your user profiles from Auth0. You will see your users appear in the End Users page in UserClouds. Passwords will not sync at this point.
103-
</Step>
87+
<Step>
88+
### Import your applications
89+
- In the same UserClouds page, scroll to the bottom card Import from Auth0 and click Import from Auth0
90+
- This will import your Auth0 app configurations (like Client ID/Secret and Login URIs) into UserClouds
91+
- The sync may take a moment - so refresh your page if you don't see any feedback immediately
92+
</Step>
93+
<Step>
94+
### Review your application configurations
95+
96+
- Next, it's beneficial to check your Auth0 configurations have successfully replicated in UserClouds, since you may be using an advanced configuration setting that UserClouds does not support migration for yet.
97+
- Navigate to each UserClouds Application's page (UserClouds > Authentication > Login Application) and review the settings
98+
</Step>
99+
<Step>
100+
## Make Auth0 your active provider
101+
102+
- In UserClouds, navigate to the Authentication Page
103+
- Scroll to the Identity Platforms: Migrations & Back-Ups card
104+
- Set Auth0 to active provider and click Save
105+
106+
At this point, UserClouds will begin syncing your user profiles from Auth0. You will see your users appear in the End Users page in UserClouds. Passwords will not sync at this point.
107+
</Step>
104108
</Steps>
109+
105110
## Begin authenticating your users via UserClouds
106111

107112
Now you are ready to start authenticating your users via UserClouds. For more info on adding UserClouds to your software, see the previous article.
108113

109-
UserClouds will now begin syncing passwords for active users. When a user is logged in, they will log in via a UserClouds page, which will send the login credentials to the active provider (Auth0). If the login succeeds, the credentials will be stored in the UserClouds User Store.
114+
UserClouds will now begin syncing passwords for active users. When a user is logged in, they will log in via a UserClouds page, which will send the login credentials to the active provider (Auth0). If the login succeeds, the credentials will be stored in the UserClouds User Store.
110115

111116
## Gather non-active users / passwords from Auth0
112117

113118
<Steps>
114-
<Step>
115-
### Submit an Auth0 support ticket for salted / hashed passwords
119+
<Step>
120+
### Submit an Auth0 support ticket for salted / hashed passwords
116121

117-
- Go to the Auth0 support portal
118-
- Submit a ticket requesting to export your hashed, salted passwords and MFA secrets for the relevant tenant, and requesting the hashing algorithms
119-
- Respond to Auth0's support team confirming you want to export all hashed passwords and MFA secrets
120-
Complete any other account verification steps
121-
</Step>
122-
<Step>
123-
### Wait for Auth0 customer service
122+
- Go to the Auth0 support portal
123+
- Submit a ticket requesting to export your hashed, salted passwords and MFA secrets for the relevant tenant, and requesting the hashing algorithms
124+
- Respond to Auth0's support team confirming you want to export all hashed passwords and MFA secrets
125+
Complete any other account verification steps
126+
</Step>
127+
<Step>
128+
### Wait for Auth0 customer service
129+
130+
Auth0 can be slow here, so this step may take up to a few weeks. After this period, Auth0 will share your login data, correct as of the date that they ran your export. UserClouds will capture any authentication changes after this time (like new users or password resets), via Step 5.
131+
132+
</Step>
133+
<Step>
134+
### Import hashed password data to UserClouds
124135

125-
Auth0 can be slow here, so this step may take up to a few weeks. After this period, Auth0 will share your login data, correct as of the date that they ran your export. UserClouds will capture any authentication changes after this time (like new users or password resets), via Step 5.
126-
</Step>
127-
<Step>
128-
### Import hashed password data to UserClouds
136+
Once Auth0 has shared your customer password data, you can upload it to UserClouds.
129137

130-
Once Auth0 has shared your customer password data, you can upload it to UserClouds. Docs coming soon! For help, please email [[email protected].](mailto:[email protected].)
138+
The UserClouds User Store now has all the login data of your inactive users (whose credentials are unchanged since the Auth0 export) and your active users (whose credentials were captured in Step 5). You have successfully exported all your user data from Auth0, without forcing any users to reset their password.
131139

132-
The UserClouds User Store now has all the login data of your inactive users (whose credentials are unchanged since the Auth0 export) and your active users (whose credentials were captured in Step 5). You have successfully exported all your user data from Auth0, without forcing any users to reset their password.
133140
</Step>
134141
</Steps>
135142

136143
## Switch your active provider back to UserClouds
137144

138145
The final step is to switch your active provider back to UserClouds. This must be done at the tenant- and app-level.
146+
139147
<Steps>
140-
<Step>
141-
### Switch your tenant's active provider to UserClouds
142-
143-
- In UserClouds, navigate to the Authentication Page
144-
- Scroll to the Identity Platforms: Migrations & Back-Ups card
145-
- Set Auth0 to active provider and click Save
146-
</Step>
147-
<Step>
148-
### Switch your apps' active providers to UserClouds
149-
150-
- In UserClouds, navigate to the Authentication Page
151-
- For each app
152-
- Click the app to go into the Application page
153-
- In the General Settings card, open the Underlying Identity Provider Apps accordion section
154-
- Check the box for your tenant's UserClouds IDP
155-
- Click Save
156-
</Step>
148+
<Step>
149+
### Switch your tenant's active provider to UserClouds
150+
151+
- In UserClouds, navigate to the Authentication Page
152+
- Scroll to the Identity Platforms: Migrations & Back-Ups card
153+
- Set Auth0 to active provider and click Save
154+
</Step>
155+
<Step>
156+
### Switch your apps' active providers to UserClouds
157+
158+
- In UserClouds, navigate to the Authentication Page
159+
- For each app - Click the app to go into the Application page - In the General Settings card, open the Underlying Identity Provider Apps accordion section - Check the box for your tenant's UserClouds IDP - Click Save
160+
</Step>
157161
</Steps>
158162
Hooray! You did it. You successfully migrated off Auth0.

content/docs/guides/(authentication)/how-to-guides/sign-up-fields.mdx

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,13 @@ title: "Add custom sign-up fields"
33
slug: "sign-up-fields"
44
excerpt: ""
55
hidden: false
6-
metadata:
7-
image: []
8-
robots: "index"
6+
metadata:
7+
image: []
8+
robots: "index"
99
createdAt: "Thu Aug 03 2023 22:56:54 GMT+0000 (Coordinated Universal Time)"
1010
updatedAt: "Fri Aug 25 2023 21:43:53 GMT+0000 (Coordinated Universal Time)"
1111
---
12+
1213
## Default fields
1314

1415
You may wish to collect certain user data on sign up, e.g. name, date of birth or phone number. You can add fields to your sign-up form in the Login Experience card of the Application Settings Page. This is reached by selecting the Application in your Tenant’s Authentication page.
15-
16-
## Custom fields
17-
18-
_Docs coming soon! To add a custom field, please email support at [[email protected]](mailto:[email protected])._

content/docs/guides/(authentication)/how-to-guides/two-factor-authentication.mdx

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,15 @@ title: "Set up two factor authentication (2FA)"
33
slug: "two-factor-authentication"
44
excerpt: ""
55
hidden: false
6-
metadata:
7-
image: []
8-
robots: "index"
6+
metadata:
7+
image: []
8+
robots: "index"
99
createdAt: "Thu Aug 03 2023 22:54:25 GMT+0000 (Coordinated Universal Time)"
1010
updatedAt: "Fri Aug 25 2023 21:43:25 GMT+0000 (Coordinated Universal Time)"
1111
---
12-
UserClouds supports 2 Factor Authentication via email and text. By default, two factor authentication is switched off.
12+
13+
UserClouds supports 2 Factor Authentication via email and text. By default, two factor authentication is switched off.
1314

1415
## Email 2FA
1516

1617
To turn on two factor authentication by email for a given application, go to the Authentication tab, select the Application and scroll to the Login Experience card. Under Authentication Settings, check the box that says "Require 2FA by email" and click Save.
17-
18-
## Text 2FA
19-
20-
_Docs coming soon! For help setting up text 2FA, please email [[email protected]](mailto:[email protected]) ._

content/docs/guides/(authentication)/quickstart-guides/add-userclouds-to-your-software.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ hidden: false
66
createdAt: "Thu Aug 03 2023 22:43:44 GMT+0000 (Coordinated Universal Time)"
77
updatedAt: "Mon Nov 04 2024 20:08:29 GMT+0000 (Coordinated Universal Time)"
88
---
9+
910
You’ve already created your first application in UserClouds. Nice job! This page shows how to set up UserClouds Authentication on your software.
1011

1112
## 1. Specify your allowed Redirect and Logout URLs
@@ -19,13 +20,11 @@ Remember to click Save to apply this change!
1920

2021
## 2. Cut and paste your UserClouds settings into the sample app code
2122

22-
Each UserClouds application has four key attributes: an application ID, an application name, a client ID and a client secret. You will need your Client ID and Client Secret, when you use your TenantURL to call UserClouds's APIs.
23+
Each UserClouds application has four key attributes: an application ID, an application name, a client ID and a client secret. You will need your Client ID and Client Secret, when you use your TenantURL to call UserClouds's APIs.
2324
Before you use the sample code elsewhere, make sure you replace the sample app’s instances of these variables with your application’s attributes. You can find these on your Application’s Settings page.
2425

2526
## 3. Implement UserClouds in your software
2627

2728
Use the sample code (or any other OIDC library you like) as a template to add UserClouds to your application.
2829

2930
Great job! You’re all set up.
30-
31-
_Looking for more info about setting up Authentication in UserClouds? Drop us a note at [[email protected]](mailto:[email protected])._

0 commit comments

Comments
 (0)