mirror of
https://github.com/zitadel/zitadel.git
synced 2025-08-11 10:07:39 +00:00
fix: change saml sp to saml idp (#8233)
# Which Problems Are Solved In the configuration of external idps we show SAML SP as provider which is confusing, as it is a SAML IdP which is configured # How the Problems Are Solved Rename SAML SP to SAML IdP
This commit is contained in:
@@ -87,7 +87,7 @@
|
|||||||
</div>
|
</div>
|
||||||
<div class="idp-table-provider-type" *ngSwitchCase="ProviderType.PROVIDER_TYPE_SAML">
|
<div class="idp-table-provider-type" *ngSwitchCase="ProviderType.PROVIDER_TYPE_SAML">
|
||||||
<img class="idp-logo" src="./assets/images/idp/saml-icon.svg" alt="saml" />
|
<img class="idp-logo" src="./assets/images/idp/saml-icon.svg" alt="saml" />
|
||||||
SAML SP
|
SAML
|
||||||
</div>
|
</div>
|
||||||
<div class="idp-table-provider-type" *ngSwitchDefault>coming soon</div>
|
<div class="idp-table-provider-type" *ngSwitchDefault>coming soon</div>
|
||||||
</div>
|
</div>
|
||||||
|
@@ -214,7 +214,7 @@
|
|||||||
>
|
>
|
||||||
<img class="idp-logo" src="./assets/images/idp/saml-icon.svg" alt="oauth" />
|
<img class="idp-logo" src="./assets/images/idp/saml-icon.svg" alt="oauth" />
|
||||||
<div class="text-container">
|
<div class="text-container">
|
||||||
<span class="title">SAML SP</span>
|
<span class="title">SAML</span>
|
||||||
</div>
|
</div>
|
||||||
</a>
|
</a>
|
||||||
</div>
|
</div>
|
||||||
|
@@ -2047,7 +2047,7 @@
|
|||||||
"DESCRIPTION": "Enter the credentials for your Apple Provider"
|
"DESCRIPTION": "Enter the credentials for your Apple Provider"
|
||||||
},
|
},
|
||||||
"SAML": {
|
"SAML": {
|
||||||
"TITLE": "Sign in with SAML SP",
|
"TITLE": "Sign in with SAML",
|
||||||
"DESCRIPTION": "Enter the credentials for your SAML Provider"
|
"DESCRIPTION": "Enter the credentials for your SAML Provider"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
@@ -51,7 +51,7 @@ Configure the sign-on method of the app.
|
|||||||
|
|
||||||
### Go to the IdP Providers Overview
|
### Go to the IdP Providers Overview
|
||||||
|
|
||||||
<IDPsOverview templates="SAML SP"/>
|
<IDPsOverview templates="SAML"/>
|
||||||
|
|
||||||
### Create a new SAML Service Provider (SP)
|
### Create a new SAML Service Provider (SP)
|
||||||
|
|
||||||
@@ -70,7 +70,7 @@ Now we configure the identity provider on ZITADEL.
|
|||||||
|
|
||||||
## Configure Basic SAML Configuration
|
## Configure Basic SAML Configuration
|
||||||
|
|
||||||
After you created the SAML SP in ZITADEL, you can copy the URLs you need to configure in your Entra ID application.
|
After you created the SAML provider in ZITADEL, you can copy the URLs you need to configure in your Entra ID application.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@@ -23,23 +23,23 @@ MockSAML is not intended for any production environment, only for test purposes
|
|||||||
### Download metadata
|
### Download metadata
|
||||||
|
|
||||||
You can either download the metadata under [https://mocksaml.com/api/saml/metadata?download=true](https://mocksaml.com/api/saml/metadata?download=true) or skip this step and
|
You can either download the metadata under [https://mocksaml.com/api/saml/metadata?download=true](https://mocksaml.com/api/saml/metadata?download=true) or skip this step and
|
||||||
fill in the URL when creating the SAML SP in ZITADEL.
|
fill in the URL when creating the SAML Provider in ZITADEL.
|
||||||
|
|
||||||
## ZITADEL configuration
|
## ZITADEL configuration
|
||||||
|
|
||||||
### Go to the IdP providers overview
|
### Go to the IdP providers overview
|
||||||
|
|
||||||
<IDPsOverview templates="SAML SP"/>
|
<IDPsOverview templates="SAML"/>
|
||||||
|
|
||||||
### Create a new SAML ServiceProvider
|
### Create a new SAML ServiceProvider
|
||||||
|
|
||||||
The SAML SP provider template has everything you need preconfigured.
|
The SAML provider template has everything you need preconfigured.
|
||||||
Add the metadata.xml or the URL to the metadata which are accessible by you ZITADEL instance.
|
Add the metadata.xml or the URL to the metadata which are accessible by you ZITADEL instance.
|
||||||
All the necessary configuration is contained in the metadata which has to be exchanged by the ServiceProvider and the IdentityProvider.
|
All the necessary configuration is contained in the metadata which has to be exchanged by the ServiceProvider and the IdentityProvider.
|
||||||
|
|
||||||
<GeneralConfigDescription provider_account="SAML account" />
|
<GeneralConfigDescription provider_account="SAML account" />
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Download metadata
|
### Download metadata
|
||||||
|
|
||||||
@@ -50,7 +50,7 @@ They are available under `https://${CUSTOMDOMAIN}/idps/\{ID of the provider in Z
|
|||||||
|
|
||||||
<Activate/>
|
<Activate/>
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Ensure your Login Policy allows External IDPs
|
### Ensure your Login Policy allows External IDPs
|
||||||
|
|
||||||
@@ -58,11 +58,11 @@ They are available under `https://${CUSTOMDOMAIN}/idps/\{ID of the provider in Z
|
|||||||
|
|
||||||
## Test the setup
|
## Test the setup
|
||||||
|
|
||||||
<TestSetup loginscreen="your SAML SP login"/>
|
<TestSetup loginscreen="your SAML login"/>
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Optional: Add ZITADEL action to autofill userdata
|
## Optional: Add ZITADEL action to autofill userdata
|
||||||
|
|
||||||
|
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure OKTA as a SAML Identity Provider in ZITADEL
|
title: Configure OKTA as a SAML Identity Provider in ZITADEL
|
||||||
sidebar_label: OKTA SAML SP
|
sidebar_label: OKTA SAML
|
||||||
id: okta-saml
|
id: okta-saml
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -18,12 +18,12 @@ import TestSetup from './_test_setup.mdx';
|
|||||||
|
|
||||||
### Go to the IdP Providers Overview
|
### Go to the IdP Providers Overview
|
||||||
|
|
||||||
<IDPsOverview templates="SAML SP"/>
|
<IDPsOverview templates="SAML"/>
|
||||||
|
|
||||||
### Create a new SAML Service Provider (SP)
|
### Create a new SAML Provider
|
||||||
|
|
||||||
To be able to create the application in OKTA we need the provider id from ZITADEL.
|
To be able to create the application in OKTA we need the provider id from ZITADEL.
|
||||||
1. Create a new SAML SP with a name and a random text in the Metadata Xml field.
|
1. Create a new SAML Provider with a name and a random text in the Metadata Xml field.
|
||||||
We will fill that as soon as we have done the configuration in OKTA.
|
We will fill that as soon as we have done the configuration in OKTA.
|
||||||
2. Save Configuration
|
2. Save Configuration
|
||||||
|
|
||||||
@@ -33,7 +33,7 @@ As an alternative you can add the SAML identity provider through the API, either
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
After you created the SAML SP in ZITADEL, you can copy the URLs you need to configure in your OKTA application.
|
After you created the SAML Provider in ZITADEL, you can copy the URLs you need to configure in your OKTA application.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
Reference in New Issue
Block a user