mirror of
https://github.com/zitadel/zitadel.git
synced 2025-12-08 23:32:14 +00:00
docs: Docs v2 (#3733)
* fix: change images * fix: change images, add policies * fix: change images, add policies * docs: add customer portal docs * docs: add customer portal docs * docs: add customer portal docs * docs: add customer portal docs * docs: organization creation * docs: policy docs * docs: change password * docs: verify domain * docs: profile page * docs: profile page * docs: profile page * docs: login page * docs: login page * docs: fix broken links * docs: customer portal users * docs: instance detail * docs: instance detail * docs: getting started * Update organizations.mdx Co-authored-by: Livio Amstutz <livio.a@gmail.com>
This commit is contained in:
@@ -39,4 +39,7 @@ Please be reminded that ZITADEL is open source — and so is the documentation.
|
||||
<ListWrapper title="Features">
|
||||
<ListElement link="./features/actions" type={ICONTYPE.FILE} title="Actions" description="Customizing ZITADELs behavior using the actions feature" />
|
||||
</ListWrapper>
|
||||
<ListWrapper title="Customer Portal">
|
||||
<ListElement link="./customerportal/instances" type={ICONTYPE.INSTANCE} title="Instances" description="Manage all your ZITADEL instances" />
|
||||
</ListWrapper>
|
||||
</Column>
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
An instance is the top hierarchy in the ZITADEL.
|
||||
Within an instance all the default [settings](./policies), such as branding, login policy, password policy, etc. for the system can be configured.
|
||||
Within an instance all the default [settings](/docs/concepts/structure/policies), such as branding, login policy, password policy, etc. for the system can be configured.
|
||||
One instance normally runs on one domain and has one issuer. (e.g login.customer.com)
|
||||
|
||||
One instance can contain multiple [organizations](./organizations). Which can represent the own company or the customers.
|
||||
|
||||
@@ -3,25 +3,40 @@ title: Settings/Policies
|
||||
---
|
||||
|
||||
Settings and policies are configurations of all the different parts of the Instance or an organization. For all parts we have a suitable default in the Instance.
|
||||
The default configuration can be overridden for each organization.
|
||||
The default configuration can be overridden for each organization, some policies are currently only available on the instance level. If thats the case it will be mentioned on the descriptions below.
|
||||
|
||||
You can find these settings in the instance page under settings, or on a specific organization menu organization in the section policies.
|
||||
Each policy can be overridden and reset to the default.
|
||||
|
||||
## General
|
||||
|
||||
You can find these settings in the instance page under settings, or on a specific organization menu organization in the section polycies.
|
||||
Each policy can be overridden and reset to the default.
|
||||
:::info
|
||||
Only available on the instance settings
|
||||
:::
|
||||
|
||||
## Password Complexity
|
||||
At the moment general settings is only one configuration. This defines the default language of the whole instance.
|
||||
|
||||
With the password complexity policy you can define the requirements for a users password.
|
||||

|
||||
|
||||
The following properties can be set:
|
||||
- Minimum Length
|
||||
- Has Uppercase
|
||||
- Has Lowercase
|
||||
- Has Number
|
||||
- Has Symbol
|
||||
## Notification
|
||||
|
||||

|
||||
:::info
|
||||
Only available on the instance settings
|
||||
:::
|
||||
|
||||
In the notification settings you can configure your SMTP and an SMS Provider. At the moment only Twilio is available as SMS provider.
|
||||
|
||||
### SMTP
|
||||
On each instance we configure our default SMTP provider. To make sure, that you only send some E-Mails from domains you own. You need to add a custom domain on your instance.
|
||||
Go to the ZITADEL [customer portal](https://zitadel.cloud) to configure a custom domain.
|
||||
|
||||

|
||||
|
||||
### SMS
|
||||
|
||||
No default provider is configured to send some sms to your users. If you like to validate the phone numbers of your users make sure to add your twilio configuration.
|
||||
|
||||

|
||||
|
||||
## Login Policy
|
||||
|
||||
@@ -37,7 +52,12 @@ The Login Policy defines how the login process should look like and which authen
|
||||
|
||||

|
||||
|
||||
### Multifactors / Second Factors
|
||||
### Passwordless
|
||||
|
||||
Passwordless authentication means that the user doesn't need to enter a password to login. In our case the user has to enter his loginname and as the next step proof the identity through a registered device or token.
|
||||
There are two different types one is depending on the device (e.g. Fingerprint, Face recognition, WindowsHello) and the other is independent (eg. Yubikey, Solokey).
|
||||
|
||||
### Multifactor
|
||||
|
||||
In the multifactors section you can configure what kind of multifactors should be allowed. For passwordless to work, it's required to enable U2F (Universial Second Factor) with PIN. There is no other option at the moment.
|
||||
Multifactors:
|
||||
@@ -49,13 +69,18 @@ Secondfactors:
|
||||
|
||||

|
||||
|
||||
### Identity Providers
|
||||
## Password Complexity
|
||||
|
||||
You can configure all kinds of external identity providers for identity brokering, which support OIDC (OpenID Connect).
|
||||
Create a new identity provider configuration and enable it in the list afterwards.
|
||||
With the password complexity policy you can define the requirements for a users password.
|
||||
|
||||
For a detailed guide about how to configure a new identity provider for identity brokering have a look at our guide:
|
||||
[Identity Brokering](../../guides/authentication/identity-brokering)
|
||||
The following properties can be set:
|
||||
- Minimum Length
|
||||
- Has Uppercase
|
||||
- Has Lowercase
|
||||
- Has Number
|
||||
- Has Symbol
|
||||
|
||||

|
||||
|
||||
## Lockout Policy
|
||||
|
||||
@@ -66,8 +91,24 @@ The following settings are available:
|
||||
|
||||
If an account is locked, the administrator has to unlock it in the ZITADEL console
|
||||
|
||||
## Identity Providers
|
||||
|
||||
## Private Labeling / Branding
|
||||
You can configure all kinds of external identity providers for identity brokering, which support OIDC (OpenID Connect).
|
||||
Create a new identity provider configuration and enable it in the list afterwards.
|
||||
|
||||
For a detailed guide about how to configure a new identity provider for identity brokering have a look at our guide:
|
||||
[Identity Brokering](../../guides/authentication/identity-brokering)
|
||||
|
||||
## Domain policy
|
||||
|
||||
In the domain policy you have two different settings.
|
||||
One is the "user_login_must_be_domain", by setting this all the users within an organisation will be suffixed with the domain of the organisation.
|
||||
|
||||
The second is "validate_org_domains" if this is set to true all created domains on an organisation must be verified per acme challenge.
|
||||
More about how to verify a domain [here](../../guides/basics/organizations#domain-verification-and-primary-domain).
|
||||
If it is set to false, all registered domain will automatically be created as verified and the users will be able to use the domain for login.
|
||||
|
||||
## Branding
|
||||
|
||||
With private labeling you can brand and customize your login page and emails, that it matches your CI/CD.
|
||||
You can configure a light and a dark design.
|
||||
@@ -82,17 +123,50 @@ Make sure you click the "Set preview as current configuration" button after you
|
||||
| Hide Loginname suffix | If enabled, your loginname suffix (Domain) will not be shown in the login page |
|
||||
| Disable Watermark | If you disable the watermark you will not see the "Powered by ZITADEL" in the login page |
|
||||
|
||||

|
||||

|
||||
|
||||
## Privacy Policy and TOS
|
||||
|
||||
Each organization is able to configure its own privacy policy and terms of service.
|
||||
Each organization is able to configure its own privacy policy, terms of service and help.
|
||||
A link to the current policies can be provided. On register each user has to accept these policies.
|
||||
|
||||
By clicking on an input field you can see the language attribute to integrate into a link, for the possibility to have different links for different languages.
|
||||
The language of the user will be set into the url.
|
||||
Example:
|
||||
https://demo.com/tos-{{.Lang}}
|
||||
|
||||
## Domain policy
|
||||

|
||||
|
||||
In the domain policy you have two different settings.
|
||||
One is the "user_login_must_be_domain", by setting this all the users within an organisation will be suffixed with the domain of the organisation.
|
||||
The second is "validate_org_domains" if this is set to true all created domains on an organisation must be verified per acme challenge. [Verify Domain] (../../guides/basics/organizations#domain-verification-and-primary-domain)
|
||||
If it is set to false, all registered domain will automatically be created as verified and the users will be able to use the domain for login.
|
||||
## OIDC token lifetime and expiration
|
||||
|
||||
:::info
|
||||
Only available on the instance settings
|
||||
:::
|
||||
|
||||
Configure how long the different oidc tokens should life.
|
||||
You can set the following times:
|
||||
- Access Token Lifetime
|
||||
- ID Token Lifetime
|
||||
- Refresh Token Expiration
|
||||
- Refresh Token Idle Expiration
|
||||
|
||||

|
||||
|
||||
|
||||
## Secret appearance
|
||||
|
||||
:::info
|
||||
Only available on the instance settings
|
||||
:::
|
||||
|
||||
ZITADEL has some different codes and secrets, that can be specified.
|
||||
You can configure what kind of characters should be included, how long the secret should be and the expiration.
|
||||
The following secrets can be configured:
|
||||
- Initialization Mail Code
|
||||
- Email verification code
|
||||
- Phone verification code
|
||||
- Password reset code
|
||||
- Passwordless initialization code
|
||||
- Application secrets
|
||||
|
||||

|
||||
Reference in New Issue
Block a user