diff --git a/.goreleaser.yaml b/.goreleaser.yaml index 4b22091911..e000b93cca 100644 --- a/.goreleaser.yaml +++ b/.goreleaser.yaml @@ -73,7 +73,7 @@ brews: token: "{{ .Env.GORELEASER_TOKEN_TAP }}" folder: Formula goarm: "7" - homepage: https://zitadel.ch + homepage: https://zitadel.com description: Open source identity solution built for the container and cloud era license: Apache 2.0 test: | diff --git a/CODE_OF_CONDUCT.md b/CODE_OF_CONDUCT.md index b107ae4ed5..802168b342 100644 --- a/CODE_OF_CONDUCT.md +++ b/CODE_OF_CONDUCT.md @@ -60,7 +60,7 @@ representative at an online or offline event. Instances of abusive, harassing, or otherwise unacceptable behavior may be reported to the community leaders responsible for enforcement at -abuse@zitadel.ch. +legal@zitadel.com. All complaints will be reviewed and investigated promptly and fairly. All community leaders are obligated to respect the privacy and security of the diff --git a/SECURITY.md b/SECURITY.md index 834b373134..235f044466 100644 --- a/SECURITY.md +++ b/SECURITY.md @@ -12,7 +12,7 @@ At ZITADEL we are extremely grateful for security aware people who disclose vuln ## Reporting a vulnerability -To file an incident, please disclose it by e-mail to security@zitadel.ch including the details of the vulnerability. +To file an incident, please disclose it by e-mail to security@zitadel.com including the details of the vulnerability. At the moment GPG encryption is no yet supported, however you may sign your message at will. diff --git a/cmd/defaults.yaml b/cmd/defaults.yaml index 887add0fc5..c2ed2ba105 100644 --- a/cmd/defaults.yaml +++ b/cmd/defaults.yaml @@ -257,8 +257,8 @@ DefaultInstance: SecondFactorCheckLifetime: 18h MultiFactorCheckLifetime: 12h PrivacyPolicy: - TOSLink: https://docs.zitadel.ch/docs/legal/terms-of-service - PrivacyLink: https://docs.zitadel.ch/docs/legal/privacy-policy + TOSLink: https://docs.zitadel.com/docs/legal/terms-of-service + PrivacyLink: https://docs.zitadel.com/docs/legal/privacy-policy HelpLink: "" LabelPolicy: PrimaryColor: "#5469d4" diff --git a/console/src/app/modules/footer/footer.component.html b/console/src/app/modules/footer/footer.component.html index 95e2a453c7..27822c69cc 100644 --- a/console/src/app/modules/footer/footer.component.html +++ b/console/src/app/modules/footer/footer.component.html @@ -21,7 +21,7 @@ - + diff --git a/console/src/app/modules/header/header.component.html b/console/src/app/modules/header/header.component.html index 9f31b8cfbe..94b5659516 100644 --- a/console/src/app/modules/header/header.component.html +++ b/console/src/app/modules/header/header.component.html @@ -169,7 +169,7 @@ - + {{ 'MENU.DOCUMENTATION' | translate }} diff --git a/console/src/app/modules/project-members/project-members.component.html b/console/src/app/modules/project-members/project-members.component.html index 344c72e14a..638ca9fbf8 100644 --- a/console/src/app/modules/project-members/project-members.component.html +++ b/console/src/app/modules/project-members/project-members.component.html @@ -5,7 +5,7 @@ >

{{ 'PROJECT.MEMBER.DESCRIPTION' | translate }} - +

diff --git a/console/src/app/pages/domains/domains.component.html b/console/src/app/pages/domains/domains.component.html index fbed63b563..d94415a70e 100644 --- a/console/src/app/pages/domains/domains.component.html +++ b/console/src/app/pages/domains/domains.component.html @@ -6,7 +6,7 @@

{{ 'ORG.DOMAINS.TITLE' | translate }}

diff --git a/console/src/app/pages/home/home.component.html b/console/src/app/pages/home/home.component.html index 6a66f1380b..0c21ac49f0 100644 --- a/console/src/app/pages/home/home.component.html +++ b/console/src/app/pages/home/home.component.html @@ -10,7 +10,7 @@
- +
@@ -18,7 +18,7 @@

{{ 'IAM.MEMBER.DESCRIPTION' | translate }} - +

diff --git a/console/src/app/pages/orgs/org-members/org-members.component.html b/console/src/app/pages/orgs/org-members/org-members.component.html index 76af8c594e..1e4e642ddf 100644 --- a/console/src/app/pages/orgs/org-members/org-members.component.html +++ b/console/src/app/pages/orgs/org-members/org-members.component.html @@ -1,7 +1,7 @@

{{ 'ORG.MEMBER.DESCRIPTION' | translate }} - +

diff --git a/console/src/app/pages/projects/apps/app-detail/app-detail.component.html b/console/src/app/pages/projects/apps/app-detail/app-detail.component.html index b442d2f0f9..ea153af43f 100644 --- a/console/src/app/pages/projects/apps/app-detail/app-detail.component.html +++ b/console/src/app/pages/projects/apps/app-detail/app-detail.component.html @@ -1,6 +1,6 @@ diff --git a/console/src/app/pages/projects/apps/app-detail/app-detail.component.ts b/console/src/app/pages/projects/apps/app-detail/app-detail.component.ts index 07d2c21b83..5851f3dadc 100644 --- a/console/src/app/pages/projects/apps/app-detail/app-detail.component.ts +++ b/console/src/app/pages/projects/apps/app-detail/app-detail.component.ts @@ -229,7 +229,7 @@ export class AppDetailComponent implements OnInit, OnDestroy { { i18nTitle: 'APP.PAGES.NEXTSTEPS.2.TITLE', i18nDesc: 'APP.PAGES.NEXTSTEPS.2.DESC', - href: 'https://docs.zitadel.ch', + href: 'https://docs.zitadel.comm', iconClasses: 'las la-people-carry', }, ]; diff --git a/console/src/app/pages/projects/granted-projects/granted-project-detail/granted-project-detail.component.html b/console/src/app/pages/projects/granted-projects/granted-project-detail/granted-project-detail.component.html index acb5d7e992..d671050449 100644 --- a/console/src/app/pages/projects/granted-projects/granted-project-detail/granted-project-detail.component.html +++ b/console/src/app/pages/projects/granted-projects/granted-project-detail/granted-project-detail.component.html @@ -1,7 +1,7 @@

{{ 'PROJECT.GRANT.DETAIL.DESC' | translate }} - diff --git a/console/src/app/pages/projects/projects.component.html b/console/src/app/pages/projects/projects.component.html index d8dede91ed..0c596c3c5c 100644 --- a/console/src/app/pages/projects/projects.component.html +++ b/console/src/app/pages/projects/projects.component.html @@ -2,7 +2,7 @@

{{ 'PROJECT.PAGES.LIST' | translate }}

- +
diff --git a/console/src/app/pages/users/user-detail/user-detail/user-detail.component.html b/console/src/app/pages/users/user-detail/user-detail/user-detail.component.html index 0995f5a59c..8d7766a41b 100644 --- a/console/src/app/pages/users/user-detail/user-detail/user-detail.component.html +++ b/console/src/app/pages/users/user-detail/user-detail/user-detail.component.html @@ -1,7 +1,7 @@

{{ 'USER.PAGES.LIST' | translate }}

- diff --git a/docs/docs/apis/proto/management.md b/docs/docs/apis/proto/management.md index 5bdeb35668..9250bbfe5a 100644 --- a/docs/docs/apis/proto/management.md +++ b/docs/docs/apis/proto/management.md @@ -2981,7 +2981,7 @@ This is an empty request | Field | Type | Description | Validation | | ----- | ---- | ----------- | ----------- | | primary_color | string | - | string.max_len: 50
| -| hide_login_name_suffix | bool | hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.ch/concepts#Reserved_Scopes | | +| hide_login_name_suffix | bool | hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.com/concepts#Reserved_Scopes | | | warn_color | string | - | string.max_len: 50
| | background_color | string | - | string.max_len: 50
| | font_color | string | - | string.max_len: 50
| diff --git a/docs/docs/apis/proto/policy.md b/docs/docs/apis/proto/policy.md index 3031ee41cb..2f519c8d3a 100644 --- a/docs/docs/apis/proto/policy.md +++ b/docs/docs/apis/proto/policy.md @@ -33,7 +33,7 @@ title: zitadel/policy.proto | details | zitadel.v1.ObjectDetails | - | | | primary_color | string | hex value for primary color | | | is_default | bool | defines if the organisation's admin changed the policy | | -| hide_login_name_suffix | bool | hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.ch/concepts#Reserved_Scopes | | +| hide_login_name_suffix | bool | hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.com/concepts#Reserved_Scopes | | | warn_color | string | hex value for secondary color | | | background_color | string | hex value for background color | | | font_color | string | hex value for font color | | diff --git a/docs/docs/guides/authentication/identity-brokering.md b/docs/docs/guides/authentication/identity-brokering.md index e0e6942555..64264f26e4 100644 --- a/docs/docs/guides/authentication/identity-brokering.md +++ b/docs/docs/guides/authentication/identity-brokering.md @@ -90,13 +90,13 @@ This case describes how to change it on the organization. ![Configure identity provider](/img/console_org_identity_provider.gif) ### 4.Send the primary domain scope on the authorization request -ZITADEL will show a set of identity providers by default. This configuration can be changed by users with the [manager role] (https://docs.zitadel.ch/docs/concepts/zitadel/objects/managers) `IAM_OWNER`. +ZITADEL will show a set of identity providers by default. This configuration can be changed by users with the [manager role] (https://docs.zitadel.com/docs/concepts/zitadel/objects/managers) `IAM_OWNER`. An organization's login settings will be shown - as soon as the user has entered the loginname and ZITADEL can identitfy to which organization he belongs; or - by sending a primary domain scope. -To get your own configuration you will have to send the [primary domain scope](https://docs.zitadel.ch/docs/apis/openidoauth/scopes#reserved-scopes) in your [authorization request](https://docs.zitadel.ch/docs/guides/authentication/login-users/#auth-request) . +To get your own configuration you will have to send the [primary domain scope](https://docs.zitadel.com/docs/apis/openidoauth/scopes#reserved-scopes) in your [authorization request](https://docs.zitadel.com/docs/guides/authentication/login-users/#auth-request) . The primary domain scope will restrict the login to your organization, so only users of your own organization will be able to login, also your branding and policies will trigger. See the following link as an example. Users will be able to register and login to the organization that verified the @caos.ch domain only. @@ -112,7 +112,7 @@ Make sure to replace the domain `caos.ch` with your own domain to trigger the co :::caution -This example uses the ZITADEL Cloud Application for demonstration. You need to create your own auth request with your applications parameters. Please see the docs to construct an [Auth Request](https://docs.zitadel.ch/docs/guides/authentication/login-users/#auth-request). +This example uses the ZITADEL Cloud Application for demonstration. You need to create your own auth request with your applications parameters. Please see the docs to construct an [Auth Request](https://docs.zitadel.com/docs/guides/authentication/login-users/#auth-request). ::: diff --git a/docs/docs/guides/authentication/serviceusers.md b/docs/docs/guides/authentication/serviceusers.md index 0db1bbfab2..d8bdbf6377 100644 --- a/docs/docs/guides/authentication/serviceusers.md +++ b/docs/docs/guides/authentication/serviceusers.md @@ -57,7 +57,7 @@ With this token you can make subsequent requests, just like a human user. In this exercise we will authenticate a service user and receive an access_token to use against a API. -> **Information:** Are you stuck? Don't hesitate to reach out to us on [Github Discussions](https://github.com/zitadel/zitadel/discussions) or [contact us](https://zitadel.ch/contact/) privately. +> **Information:** Are you stuck? Don't hesitate to reach out to us on [Github Discussions](https://github.com/zitadel/zitadel/discussions) or [contact us](https://zitadel.com/contact/) privately. ### 1. Generate a private-public key pair in ZITADEL diff --git a/docs/docs/guides/authorization/oauth-recommended-flows.md b/docs/docs/guides/authorization/oauth-recommended-flows.md index de145fdc46..f0134e1d91 100644 --- a/docs/docs/guides/authorization/oauth-recommended-flows.md +++ b/docs/docs/guides/authorization/oauth-recommended-flows.md @@ -56,7 +56,7 @@ So what do we want to achieve with delegated authentication? * Instead of sending around the user’s credentials * Clients may access protected resources with an **access token** that is only valid for specific scope and limited lifetime (OAuth 2.x) - * Users have to **authorize** applications to access certain [**scopes**](https://docs.zitadel.ch/architecture#Scopes) (eg, email address or custom roles). Applications can request [**claims**](https://docs.zitadel.ch/architecture#Claims) (key:value pairs, eg email address) for the authorized scopes with the access token or ID token from ZITADEL + * Users have to **authorize** applications to access certain [**scopes**](https://docs.zitadel.com/architecture#Scopes) (eg, email address or custom roles). Applications can request [**claims**](https://docs.zitadel.com/architecture#Claims) (key:value pairs, eg email address) for the authorized scopes with the access token or ID token from ZITADEL * Access tokens are bearer tokens, meaning that possession of the token provides access to a resource. But the tokens expire frequently and the application must request a new access token via **refresh token** or the user must reauthenticate ![Overview federated identities](/img/guides/consulting_federated_identities_basics.png) @@ -115,7 +115,7 @@ If you don’t have any technical limitations, you should favor the flow Authori We recommend using **“JWT bearer token with private key”** ([RFC7523](https://tools.ietf.org/html/rfc7523)) for Machine-to-Machine clients. -What this means is that you have to send an JWT token, containing the [standard claims for access tokens](https://docs.zitadel.ch/architecture#Claims) and that is signed with your private key, to the token endpoint to request the access token. We will see how this works in another module about Service Accounts. +What this means is that you have to send an JWT token, containing the [standard claims for access tokens](https://docs.zitadel.com/architecture#Claims) and that is signed with your private key, to the token endpoint to request the access token. We will see how this works in another module about Service Accounts. If you don’t have any technical limitations, you should prefer this method over other methods. diff --git a/docs/docs/guides/customization/branding.md b/docs/docs/guides/customization/branding.md index 8759f443df..5b23774287 100644 --- a/docs/docs/guides/customization/branding.md +++ b/docs/docs/guides/customization/branding.md @@ -36,7 +36,7 @@ In the advanced behavior you can choose if the loginname suffix (domain e.g road If you like to trigger your settings for your applications you have different possibilities. ### 1. Primary Domain Scope -Send a [primary domain scope](https://docs.zitadel.ch/docs/apis/openidoauth/scopes#reserved-scopes) with your [authorization request](https://docs.zitadel.ch/docs/guides/authentication/login-users/#auth-request) to trigger your organization. +Send a [primary domain scope](https://docs.zitadel.com/docs/apis/openidoauth/scopes#reserved-scopes) with your [authorization request](https://docs.zitadel.com/docs/guides/authentication/login-users/#auth-request) to trigger your organization. The primary domain scope will restrict the login to your organization, so only users of your own organization will be able to login. See the following link as an example. Users will be able to register and login to the organization that verified the @caos.ch domain only. @@ -52,7 +52,7 @@ Make sure to replace the domain `caos.ch` with your own domain to trigger the co :::caution -This example uses the ZITADEL Cloud Application for demonstration. You need to create your own auth request with your applications parameters. Please see the docs to construct an [Auth Request](https://docs.zitadel.ch/docs/guides/authentication/login-users/#auth-request). +This example uses the ZITADEL Cloud Application for demonstration. You need to create your own auth request with your applications parameters. Please see the docs to construct an [Auth Request](https://docs.zitadel.com/docs/guides/authentication/login-users/#auth-request). ::: diff --git a/docs/docs/guides/overview.mdx b/docs/docs/guides/overview.mdx index bbcac49672..3bbd5d2d5b 100644 --- a/docs/docs/guides/overview.mdx +++ b/docs/docs/guides/overview.mdx @@ -7,7 +7,7 @@ import Column from "../../src/components/column"; With our guides you will learn everything you need to know about specific topics. You get step-by-step instructions for certain tasks and have a knowledge check at the end. -You can either use our cloud-instance [zitadel.ch](https://zitadel.ch) or deploy a dedicated **ZITADEL** instance. To get started, we recommend you to try out our free tier first. Jump directly to the [get started](./basics/get-started) docs. +You can either use our cloud-instance [zitadel.ch](https://zitadel.com) or deploy a dedicated **ZITADEL** instance. To get started, we recommend you to try out our free tier first. Jump directly to the [get started](./basics/get-started) docs. When you are familiar with the ZITADEL usage, you can choose to stay on [zitadel.ch](./installation/shared-cloud), order your own [dedicated instance](./installation/shared-cloud) which is also availabe on premise, or install ZITADEL easily on your own using [Custom Kubernetes Resources](./installation/crd), [GitOps](./installation/gitops) or [ORBOS](./installation/orbos). diff --git a/docs/docs/guides/solution-scenarios/b2b.mdx b/docs/docs/guides/solution-scenarios/b2b.mdx index 15e789cba1..633802a468 100644 --- a/docs/docs/guides/solution-scenarios/b2b.mdx +++ b/docs/docs/guides/solution-scenarios/b2b.mdx @@ -76,7 +76,7 @@ If you had such a use case, ZITADEL manager roles must be assigned to those user ### Noteworthy Due to the fact that ZITADEL includes unlimited users, projects, and applications and comes with all security features in the FREE tier, ZITADEL can be considered a great alternative to other SaaS IAM systems such as Auth0 or Okta. -In such a case with this high potential of scalability where user counts can grow explosively, ZITADEL does not become the bottleneck and therefore is the valid choice. You can learn more on ZITADELs benefits and the pricing [here](https://zitadel.ch/pricing). +In such a case with this high potential of scalability where user counts can grow explosively, ZITADEL does not become the bottleneck and therefore is the valid choice. You can learn more on ZITADELs benefits and the pricing [here](https://zitadel.com/pricing). ### Learn more diff --git a/docs/docs/guides/trainings/supportservice/recurring.md b/docs/docs/guides/trainings/supportservice/recurring.md index a516ab009a..e62e9aaa5c 100644 --- a/docs/docs/guides/trainings/supportservice/recurring.md +++ b/docs/docs/guides/trainings/supportservice/recurring.md @@ -16,7 +16,7 @@ In this session you can refresh knowledge about existing and gain experience wit * Review of customer feedback * Q&A -**Price**: [Get a quote](https://zitadel.ch/contact) +**Price**: [Get a quote](https://zitadel.com/contact) ## ZITADEL Support Onboarding @@ -34,4 +34,4 @@ In this hands-on training new support staff will get an overview of the system a * Walk-through key features * Q&A -**Price**: [Get a quote](https://zitadel.ch/contact) \ No newline at end of file +**Price**: [Get a quote](https://zitadel.com/contact) \ No newline at end of file diff --git a/docs/docs/legal/dedicated-instance-annex.md b/docs/docs/legal/dedicated-instance-annex.md index a653536f36..c88381af58 100644 --- a/docs/docs/legal/dedicated-instance-annex.md +++ b/docs/docs/legal/dedicated-instance-annex.md @@ -63,14 +63,14 @@ Data processing | CH | custom | custom ### Infrastructure Provider -CAOS offers the following guarantees for a given infrastructure provider and customer satisfies the [prerequisites](https://docs.zitadel.ch/docs/guides/installation/managed-dedicated-instance). +CAOS offers the following guarantees for a given infrastructure provider and customer satisfies the [prerequisites](https://docs.zitadel.com/docs/guides/installation/managed-dedicated-instance). Guarantees | Google Cloud | Static / Other | Self-hosted ---|---|---|--- Maintained by CAOS | yes | yes, product only | no 24x7 monitoring | yes | yes, product only | yes, product only Availability SLO | [up to 99.9%](service-level-description#availability-objective) | none | none -Performance SLO | up to [rate limits](https://docs.zitadel.ch/docs/legal/rate-limit-policy#what-rate-limits-do-apply) | none | none +Performance SLO | up to [rate limits](https://docs.zitadel.com/docs/legal/rate-limit-policy#what-rate-limits-do-apply) | none | none ### Backup diff --git a/docs/docs/legal/rate-limit-policy.md b/docs/docs/legal/rate-limit-policy.md index 7973cd2443..c9004eb747 100644 --- a/docs/docs/legal/rate-limit-policy.md +++ b/docs/docs/legal/rate-limit-policy.md @@ -33,5 +33,5 @@ For our API rate limits please check the [API Endpoint Rate Limits](/docs/apis/r ## Load Testing -If you would like to conduct load testing of ZITADEL Cloud or a managed instance, you MUST request to do so with a minimum of 2 weeks notice before the test by contacting us at support@zitadel.ch. +If you would like to conduct load testing of ZITADEL Cloud or a managed instance, you MUST request to do so with a minimum of 2 weeks notice before the test by contacting us at support@zitadel.com. You MUST NOT conduct load testing without prior approval by us. Without prior approval and setup there is a high risk of being flagged by our DDoS solution as malicious traffic. This can have a severe impact on your service quality or result in termination of your agreement. diff --git a/docs/docs/manuals/user-login.md b/docs/docs/manuals/user-login.md index 53eae1117d..0e2c5b8f80 100644 --- a/docs/docs/manuals/user-login.md +++ b/docs/docs/manuals/user-login.md @@ -29,7 +29,7 @@ You can find out how to register OTP [here](./user-factors). ### Can't remember your otp -If you have a problem with your OTP, please contact your organization support. If you have a user in the Global Organization feel free to contact support@zitadel.ch +If you have a problem with your OTP, please contact your organization support. If you have a user in the Global Organization feel free to contact support@zitadel.com ## Login with Universal Second Factor (U2F) (FaceID, FingerPrint, etc.) diff --git a/docs/docs/quickstarts/login/react.md b/docs/docs/quickstarts/login/react.md index d6232d8467..69e7f0c2a8 100644 --- a/docs/docs/quickstarts/login/react.md +++ b/docs/docs/quickstarts/login/react.md @@ -11,7 +11,7 @@ At the end of the guide you should have an application able to login a user and Before we can start building our application we have to do a few configuration steps in ZITADEL Console. You will need to provide some information about your app. We recommend creating a new app to start from scratch. Navigate to your [Project](https://console.zitadel.ch/projects) and add a new application at the top of the page. -Select User Agent and continue. More about the different app types can you find [here](https://docs.zitadel.ch/docs/guides/authorization/oauth-recommended-flows#different-client-profiles). +Select User Agent and continue. More about the different app types can you find [here](https://docs.zitadel.com/docs/guides/authorization/oauth-recommended-flows#different-client-profiles). We recommend that you use [Authorization Code](../../apis/openidoauth/grant-types#authorization-code) in combination with [Proof Key for Code Exchange](../../apis/openidoauth/grant-types#proof-key-for-code-exchange) for all web applications. ### Redirect URLs diff --git a/docs/static/security.txt b/docs/static/security.txt index 1230c025dc..f5d520014c 100644 --- a/docs/static/security.txt +++ b/docs/static/security.txt @@ -1,4 +1,4 @@ -Contact: mailto:security@zitadel.ch +Contact: mailto:security@zitadel.com Expires: Fri, 31 Dec 2021 23:00 +0200 Preferred-Languages: en, de -Canonical: https://docs.zitadel.ch/security.txt \ No newline at end of file +Canonical: https://docs.zitadel.com/security.txt \ No newline at end of file diff --git a/internal/command/user_human_test.go b/internal/command/user_human_test.go index f4132cb51f..e2b9a70c2c 100644 --- a/internal/command/user_human_test.go +++ b/internal/command/user_human_test.go @@ -2808,7 +2808,7 @@ func TestAddHumanCommand(t *testing.T) { Username: "username", PreferredLanguage: language.English, Email: Email{ - Address: "support@zitadel.ch", + Address: "support@zitadel.com", }, }, }, @@ -2824,7 +2824,7 @@ func TestAddHumanCommand(t *testing.T) { Username: "username", PreferredLanguage: language.English, FirstName: "hurst", - Email: Email{Address: "support@zitadel.ch"}, + Email: Email{Address: "support@zitadel.com"}, }, }, want: Want{ @@ -2836,7 +2836,7 @@ func TestAddHumanCommand(t *testing.T) { args: args{ a: agg, human: &AddHuman{ - Email: Email{Address: "support@zitadel.ch"}, + Email: Email{Address: "support@zitadel.com"}, PreferredLanguage: language.English, FirstName: "gigi", LastName: "giraffe", @@ -2880,7 +2880,7 @@ func TestAddHumanCommand(t *testing.T) { args: args{ a: agg, human: &AddHuman{ - Email: Email{Address: "support@zitadel.ch", Verified: true}, + Email: Email{Address: "support@zitadel.com", Verified: true}, PreferredLanguage: language.English, FirstName: "gigi", LastName: "giraffe", @@ -2930,7 +2930,7 @@ func TestAddHumanCommand(t *testing.T) { "gigi giraffe", language.English, 0, - "support@zitadel.ch", + "support@zitadel.com", true, ) event.AddPasswordData(&crypto.CryptoValue{ diff --git a/internal/command/user_test.go b/internal/command/user_test.go index b92f52facd..3d8c347442 100644 --- a/internal/command/user_test.go +++ b/internal/command/user_test.go @@ -1630,7 +1630,7 @@ func TestExistsUser(t *testing.T) { "displayName", language.German, domain.GenderFemale, - "support@zitadel.ch", + "support@zitadel.com", true, ), }, nil @@ -1656,7 +1656,7 @@ func TestExistsUser(t *testing.T) { "displayName", language.German, domain.GenderFemale, - "support@zitadel.ch", + "support@zitadel.com", true, ), }, nil diff --git a/internal/query/projection/user_test.go b/internal/query/projection/user_test.go index b0c3e754ac..554f0262d3 100644 --- a/internal/query/projection/user_test.go +++ b/internal/query/projection/user_test.go @@ -36,7 +36,7 @@ func TestUserProjection_reduces(t *testing.T) { "displayName": "display-name", "preferredLanguage": "ch-DE", "gender": 1, - "email": "email@zitadel.ch", + "email": "email@zitadel.com", "phone": "+41 00 000 00 00" }`), ), user.HumanAddedEventMapper), @@ -73,7 +73,7 @@ func TestUserProjection_reduces(t *testing.T) { &sql.NullString{String: "display-name", Valid: true}, &sql.NullString{String: "ch-DE", Valid: true}, &sql.NullInt16{Int16: int16(domain.GenderFemale), Valid: true}, - "email@zitadel.ch", + "email@zitadel.com", &sql.NullString{String: "+41 00 000 00 00", Valid: true}, }, }, @@ -95,7 +95,7 @@ func TestUserProjection_reduces(t *testing.T) { "displayName": "display-name", "preferredLanguage": "ch-DE", "gender": 1, - "email": "email@zitadel.ch", + "email": "email@zitadel.com", "phone": "+41 00 000 00 00" }`), ), user.HumanAddedEventMapper), @@ -132,7 +132,7 @@ func TestUserProjection_reduces(t *testing.T) { &sql.NullString{String: "display-name", Valid: true}, &sql.NullString{String: "ch-DE", Valid: true}, &sql.NullInt16{Int16: int16(domain.GenderFemale), Valid: true}, - "email@zitadel.ch", + "email@zitadel.com", &sql.NullString{String: "+41 00 000 00 00", Valid: true}, }, }, @@ -150,7 +150,7 @@ func TestUserProjection_reduces(t *testing.T) { "username": "user-name", "firstName": "first-name", "lastName": "last-name", - "email": "email@zitadel.ch" + "email": "email@zitadel.com" }`), ), user.HumanAddedEventMapper), }, @@ -186,7 +186,7 @@ func TestUserProjection_reduces(t *testing.T) { &sql.NullString{}, &sql.NullString{String: "und", Valid: false}, &sql.NullInt16{}, - "email@zitadel.ch", + "email@zitadel.com", &sql.NullString{}, }, }, @@ -208,7 +208,7 @@ func TestUserProjection_reduces(t *testing.T) { "displayName": "display-name", "preferredLanguage": "ch-DE", "gender": 1, - "email": "email@zitadel.ch", + "email": "email@zitadel.com", "phone": "+41 00 000 00 00" }`), ), user.HumanRegisteredEventMapper), @@ -245,7 +245,7 @@ func TestUserProjection_reduces(t *testing.T) { &sql.NullString{String: "display-name", Valid: true}, &sql.NullString{String: "ch-DE", Valid: true}, &sql.NullInt16{Int16: int16(domain.GenderFemale), Valid: true}, - "email@zitadel.ch", + "email@zitadel.com", &sql.NullString{String: "+41 00 000 00 00", Valid: true}, }, }, @@ -267,7 +267,7 @@ func TestUserProjection_reduces(t *testing.T) { "displayName": "display-name", "preferredLanguage": "ch-DE", "gender": 1, - "email": "email@zitadel.ch", + "email": "email@zitadel.com", "phone": "+41 00 000 00 00" }`), ), user.HumanRegisteredEventMapper), @@ -304,7 +304,7 @@ func TestUserProjection_reduces(t *testing.T) { &sql.NullString{String: "display-name", Valid: true}, &sql.NullString{String: "ch-DE", Valid: true}, &sql.NullInt16{Int16: int16(domain.GenderFemale), Valid: true}, - "email@zitadel.ch", + "email@zitadel.com", &sql.NullString{String: "+41 00 000 00 00", Valid: true}, }, }, @@ -322,7 +322,7 @@ func TestUserProjection_reduces(t *testing.T) { "username": "user-name", "firstName": "first-name", "lastName": "last-name", - "email": "email@zitadel.ch" + "email": "email@zitadel.com" }`), ), user.HumanRegisteredEventMapper), }, @@ -358,7 +358,7 @@ func TestUserProjection_reduces(t *testing.T) { &sql.NullString{}, &sql.NullString{String: "und", Valid: false}, &sql.NullInt16{}, - "email@zitadel.ch", + "email@zitadel.com", &sql.NullString{}, }, }, @@ -984,7 +984,7 @@ func TestUserProjection_reduces(t *testing.T) { repository.EventType(user.HumanEmailChangedType), user.AggregateType, []byte(`{ - "email": "email@zitadel.ch" + "email": "email@zitadel.com" }`), ), user.HumanEmailChangedEventMapper), }, @@ -1007,7 +1007,7 @@ func TestUserProjection_reduces(t *testing.T) { { expectedStmt: "UPDATE projections.users_humans SET (email, is_email_verified) = ($1, $2) WHERE (user_id = $3)", expectedArgs: []interface{}{ - "email@zitadel.ch", + "email@zitadel.com", false, "agg-id", }, @@ -1023,7 +1023,7 @@ func TestUserProjection_reduces(t *testing.T) { repository.EventType(user.UserV1EmailChangedType), user.AggregateType, []byte(`{ - "email": "email@zitadel.ch" + "email": "email@zitadel.com" }`), ), user.HumanEmailChangedEventMapper), }, @@ -1046,7 +1046,7 @@ func TestUserProjection_reduces(t *testing.T) { { expectedStmt: "UPDATE projections.users_humans SET (email, is_email_verified) = ($1, $2) WHERE (user_id = $3)", expectedArgs: []interface{}{ - "email@zitadel.ch", + "email@zitadel.com", false, "agg-id", }, diff --git a/proto/zitadel/admin.proto b/proto/zitadel/admin.proto index 64096b55c6..9bce368512 100644 --- a/proto/zitadel/admin.proto +++ b/proto/zitadel/admin.proto @@ -30,8 +30,8 @@ option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_swagger) = { description: "This API is intended to configure and manage the IAM instance itself."; contact:{ name: "CAOS developers of ZITADEL" - url: "https://zitadel.ch" - email: "hi@zitadel.ch" + url: "https://zitadel.com" + email: "hi@zitadel.com" } license: { name: "Apache 2.0", @@ -56,7 +56,7 @@ option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_swagger) = { external_docs: { description: "Detailed information about ZITADEL", - url: "https://docs.zitadel.ch" + url: "https://docs.zitadel.com" } security_definitions: { @@ -379,7 +379,7 @@ service AdminService { tags: "orgs"; tags: "global"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Organizations"; + url: "https://docs.zitadel.com/administrate#Organizations"; description: "detailed information about organizations"; }; responses: { @@ -405,7 +405,7 @@ service AdminService { tags: "orgs"; tags: "global"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Organizations"; + url: "https://docs.zitadel.com/administrate#Organizations"; description: "detailed information about organizations"; }; responses: { @@ -439,7 +439,7 @@ service AdminService { tags: "orgs"; tags: "global"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Organizations"; + url: "https://docs.zitadel.com/administrate#Organizations"; description: "detailed information about organizations"; }; responses: { @@ -478,7 +478,7 @@ service AdminService { tags: "orgs"; tags: "global"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Organizations"; + url: "https://docs.zitadel.com/administrate#Organizations"; description: "detailed information about organizations"; }; responses: { @@ -514,7 +514,7 @@ service AdminService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#What_are_Identity_Providers"; + url: "https://docs.zitadel.com/administrate#What_are_Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -551,7 +551,7 @@ service AdminService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#What_are_Identity_Providers"; + url: "https://docs.zitadel.com/administrate#What_are_Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -590,7 +590,7 @@ service AdminService { tags: "oidc"; external_docs: { - url: "https://docs.zitadel.ch/concepts#OpenID_Connect_1_0_and_OAuth_2_0"; + url: "https://docs.zitadel.com/concepts#OpenID_Connect_1_0_and_OAuth_2_0"; description: "detailed descriptions about oidc configuration"; }; responses: { @@ -663,7 +663,7 @@ service AdminService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#What_are_Identity_Providers"; + url: "https://docs.zitadel.com/administrate#What_are_Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -700,7 +700,7 @@ service AdminService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#What_are_Identity_Providers"; + url: "https://docs.zitadel.com/administrate#What_are_Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -737,7 +737,7 @@ service AdminService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#What_are_Identity_Providers"; + url: "https://docs.zitadel.com/administrate#What_are_Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -773,7 +773,7 @@ service AdminService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#What_are_Identity_Providers"; + url: "https://docs.zitadel.com/administrate#What_are_Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -812,7 +812,7 @@ service AdminService { tags: "identity provider"; tags: "oidc"; external_docs: { - url: "https://docs.zitadel.ch/concepts#OpenID_Connect_1_0_and_OAuth_2_0"; + url: "https://docs.zitadel.com/concepts#OpenID_Connect_1_0_and_OAuth_2_0"; description: "detailed descriptions about oidc configuration"; }; responses: { @@ -907,7 +907,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -936,7 +936,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -963,7 +963,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -991,7 +991,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -1019,7 +1019,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -1047,7 +1047,7 @@ service AdminService { tags: "orgiam"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the orgiam"; }; responses: { @@ -1073,7 +1073,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -1101,7 +1101,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -1127,7 +1127,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -1154,7 +1154,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -1181,7 +1181,7 @@ service AdminService { tags: "domain policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domain policy"; }; responses: { @@ -1208,7 +1208,7 @@ service AdminService { tags: "domainpolicy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#IAM_Access_Preference"; + url: "https://docs.zitadel.com/administrate#IAM_Access_Preference"; description: "detailed information about the domainpolicy"; }; responses: { @@ -1369,7 +1369,7 @@ service AdminService { tags: "login policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Login_Options"; + url: "https://docs.zitadel.com/administrate#Login_Options"; description: "detailed information about the login policy"; }; responses: { @@ -1397,7 +1397,7 @@ service AdminService { tags: "login policy"; tags: "policy"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Login_Options"; + url: "https://docs.zitadel.com/administrate#Login_Options"; description: "detailed information about the login policy"; }; responses: { @@ -1426,7 +1426,7 @@ service AdminService { tags: "policy"; tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Identity_Providers"; + url: "https://docs.zitadel.com/administrate#Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -1455,7 +1455,7 @@ service AdminService { tags: "policy"; tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Identity_Providers"; + url: "https://docs.zitadel.com/administrate#Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -1483,7 +1483,7 @@ service AdminService { tags: "policy"; tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Identity_Providers"; + url: "https://docs.zitadel.com/administrate#Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -1510,7 +1510,7 @@ service AdminService { tags: "policy"; tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Identity_Providers"; + url: "https://docs.zitadel.com/administrate#Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -1539,7 +1539,7 @@ service AdminService { tags: "policy"; tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Identity_Providers"; + url: "https://docs.zitadel.com/administrate#Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -1578,7 +1578,7 @@ service AdminService { tags: "policy"; tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Identity_Providers"; + url: "https://docs.zitadel.com/administrate#Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -1616,7 +1616,7 @@ service AdminService { tags: "policy"; tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Identity_Providers"; + url: "https://docs.zitadel.com/administrate#Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -1645,7 +1645,7 @@ service AdminService { tags: "policy"; tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Identity_Providers"; + url: "https://docs.zitadel.com/administrate#Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -1684,7 +1684,7 @@ service AdminService { tags: "policy"; tags: "identity provider"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Identity_Providers"; + url: "https://docs.zitadel.com/administrate#Identity_Providers"; description: "detailed information about identity providers"; }; responses: { @@ -1722,7 +1722,7 @@ service AdminService { tags: "password policy"; tags: "password complexity"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Password_complexity"; + url: "https://docs.zitadel.com/administrate#Password_complexity"; description: "detailed information about the password complexity policy"; }; responses: { @@ -1751,7 +1751,7 @@ service AdminService { tags: "password policy"; tags: "password complexity"; external_docs: { - url: "https://docs.zitadel.ch/administrate#Password_complexity"; + url: "https://docs.zitadel.com/administrate#Password_complexity"; description: "detailed information about the password complexity policy"; }; responses: { @@ -2286,7 +2286,7 @@ service AdminService { tags: "member"; tags: "roles"; external_docs: { - url: "https://docs.zitadel.ch/administrate#ZITADEL_s_management_roles"; + url: "https://docs.zitadel.com/administrate#ZITADEL_s_management_roles"; description: "detailed information about the IAM member roles"; }; responses: { @@ -2315,7 +2315,7 @@ service AdminService { tags: "member"; tags: "iam member"; external_docs: { - url: "https://docs.zitadel.ch/administrate#ZITADEL_s_management_roles"; + url: "https://docs.zitadel.com/administrate#ZITADEL_s_management_roles"; description: "detailed information about the IAM member roles"; }; responses: { @@ -2344,7 +2344,7 @@ service AdminService { tags: "member"; tags: "iam member"; external_docs: { - url: "https://docs.zitadel.ch/administrate#ZITADEL_s_management_roles"; + url: "https://docs.zitadel.com/administrate#ZITADEL_s_management_roles"; description: "detailed information about the IAM member roles"; }; responses: { @@ -2384,7 +2384,7 @@ service AdminService { tags: "member"; tags: "iam member"; external_docs: { - url: "https://docs.zitadel.ch/administrate#ZITADEL_s_management_roles"; + url: "https://docs.zitadel.com/administrate#ZITADEL_s_management_roles"; description: "detailed information about the IAM member roles"; }; responses: { @@ -2422,7 +2422,7 @@ service AdminService { tags: "member"; tags: "iam member"; external_docs: { - url: "https://docs.zitadel.ch/administrate#ZITADEL_s_management_roles"; + url: "https://docs.zitadel.com/administrate#ZITADEL_s_management_roles"; description: "detailed information about the IAM member roles"; }; responses: { @@ -2460,7 +2460,7 @@ service AdminService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "views"; external_docs: { - url: "https://docs.zitadel.ch/concepts#Software_Architecture"; + url: "https://docs.zitadel.com/concepts#Software_Architecture"; description: "details of ZITADEL's event driven software concepts"; }; responses: { @@ -2487,7 +2487,7 @@ service AdminService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "failed events"; external_docs: { - url: "https://docs.zitadel.ch/concepts#Software_Architecture"; + url: "https://docs.zitadel.com/concepts#Software_Architecture"; description: "details of ZITADEL's event driven software concepts"; }; responses: { @@ -2516,7 +2516,7 @@ service AdminService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "failed events"; external_docs: { - url: "https://docs.zitadel.ch/concepts#Software_Architecture"; + url: "https://docs.zitadel.com/concepts#Software_Architecture"; description: "details of ZITADEL's event driven software concepts"; }; responses: { @@ -3591,7 +3591,7 @@ message UpdateLabelPolicyRequest { ]; bool hide_login_name_suffix = 3 [ (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_field) = { - description: "hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.ch/concepts#Reserved_Scopes"; + description: "hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.com/concepts#Reserved_Scopes"; } ]; string warn_color = 4 [(validate.rules).string = {max_len: 50}]; diff --git a/proto/zitadel/auth.proto b/proto/zitadel/auth.proto index 696207b73c..1a57e8c7d3 100644 --- a/proto/zitadel/auth.proto +++ b/proto/zitadel/auth.proto @@ -24,9 +24,9 @@ option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_swagger) = { version: "1.0"; description: "The authentication API is used for all operations on the currently logged in user."; contact:{ - name: "CAOS developers of ZITADEL" - url: "https://zitadel.ch" - email: "hi@zitadel.ch" + name: "ZITADEL" + url: "https://zitadel.com" + email: "hi@zitadel.com" } license: { name: "Apache License 2.0", @@ -49,7 +49,7 @@ option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_swagger) = { external_docs: { description: "Detailed information about ZITADEL", - url: "https://docs.zitadel.ch" + url: "https://docs.zitadel.com" } }; diff --git a/proto/zitadel/management.proto b/proto/zitadel/management.proto index b25ab3d44d..b614fbc7ed 100644 --- a/proto/zitadel/management.proto +++ b/proto/zitadel/management.proto @@ -33,9 +33,9 @@ option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_swagger) = { version: "1.0"; description: "The management API is as the name states the interface where systems can mutate IAM objects like, organisations, projects, clients, users and so on if they have the necessary access rights."; contact:{ - name: "CAOS developers of ZITADEL" - url: "https://zitadel.ch" - email: "hi@zitadel.ch" + name: "ZITADEL" + url: "https://zitadel.com" + email: "hi@zitadel.com" } license: { name: "Apache License 2.0", @@ -59,7 +59,7 @@ option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_swagger) = { external_docs: { description: "Detailed information about ZITADEL", - url: "https://docs.zitadel.ch" + url: "https://docs.zitadel.com" } extensions: { @@ -4663,10 +4663,10 @@ message GetDefaultLabelPolicyResponse { message AddCustomLabelPolicyRequest { string primary_color = 1 [(validate.rules).string = {max_len: 50}]; - // hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.ch/concepts#Reserved_Scopes + // hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.com/concepts#Reserved_Scopes bool hide_login_name_suffix = 3 [ (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_field) = { - description: "hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.ch/concepts#Reserved_Scopes"; + description: "hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.com/concepts#Reserved_Scopes"; } ]; string warn_color = 4 [(validate.rules).string = {max_len: 50}]; @@ -4687,7 +4687,7 @@ message UpdateCustomLabelPolicyRequest { string primary_color = 1 [(validate.rules).string = {max_len: 50}]; bool hide_login_name_suffix = 3 [ (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_field) = { - description: "hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.ch/concepts#Reserved_Scopes"; + description: "hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.com/concepts#Reserved_Scopes"; } ]; string warn_color = 4 [(validate.rules).string = {max_len: 50}]; diff --git a/proto/zitadel/policy.proto b/proto/zitadel/policy.proto index 2d6f887676..905cd38f35 100644 --- a/proto/zitadel/policy.proto +++ b/proto/zitadel/policy.proto @@ -62,10 +62,10 @@ message LabelPolicy { description: "defines if the organisation's admin changed the policy" } ]; - // hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.ch/concepts#Reserved_Scopes + // hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.com/concepts#Reserved_Scopes bool hide_login_name_suffix = 5 [ (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_field) = { - description: "hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.ch/concepts#Reserved_Scopes"; + description: "hides the org suffix on the login form if the scope \"urn:zitadel:iam:org:domain:primary:{domainname}\" is set. Details about this scope in https://docs.zitadel.com/concepts#Reserved_Scopes"; } ]; // hex value for secondary color diff --git a/proto/zitadel/system.proto b/proto/zitadel/system.proto index 11d1b617cb..523fe2df28 100644 --- a/proto/zitadel/system.proto +++ b/proto/zitadel/system.proto @@ -19,9 +19,9 @@ option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_swagger) = { version: "1.0"; description: "This API is intended to configure and manage the different tenants whithin ZITADEL."; contact:{ - name: "CAOS developers of ZITADEL" - url: "https://zitadel.ch" - email: "hi@zitadel.ch" + name: "ZITADEL" + url: "https://zitadel.com" + email: "hi@zitadel.com" } license: { name: "Apache 2.0", @@ -46,7 +46,7 @@ option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_swagger) = { external_docs: { description: "Detailed information about ZITADEL", - url: "https://docs.zitadel.ch" + url: "https://docs.zitadel.com" } responses: { @@ -182,7 +182,7 @@ service SystemService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "views"; external_docs: { - url: "https://docs.zitadel.ch/concepts#Software_Architecture"; + url: "https://docs.zitadel.com/concepts#Software_Architecture"; description: "details of ZITADEL's event driven software concepts"; }; responses: { @@ -210,7 +210,7 @@ service SystemService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "views"; external_docs: { - url: "https://docs.zitadel.ch/concepts#Software_Architecture"; + url: "https://docs.zitadel.com/concepts#Software_Architecture"; description: "details of ZITADEL's event driven software concepts"; }; responses: { @@ -234,7 +234,7 @@ service SystemService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "failed events"; external_docs: { - url: "https://docs.zitadel.ch/concepts#Software_Architecture"; + url: "https://docs.zitadel.com/concepts#Software_Architecture"; description: "details of ZITADEL's event driven software concepts"; }; responses: { @@ -259,7 +259,7 @@ service SystemService { option (grpc.gateway.protoc_gen_openapiv2.options.openapiv2_operation) = { tags: "failed events"; external_docs: { - url: "https://docs.zitadel.ch/concepts#Software_Architecture"; + url: "https://docs.zitadel.com/concepts#Software_Architecture"; description: "details of ZITADEL's event driven software concepts"; }; responses: {