revert: "feat(IDP): use single callback endpoint"
This reverts commit e126ccc9aa
.
# Which Problems Are Solved
#8295 introduced the possibility to handle idps on a single callback,
but broke current setups.
# How the Problems Are Solved
- Revert the change until a proper solution is found. Revert is needed
as docs were also changed.
# Additional Changes
None.
# Additional Context
- relates to #8295
@@ -72,7 +72,7 @@ Now we configure the identity provider on ZITADEL.
|
||||
|
||||
After you created the SAML provider in ZITADEL, you can copy the URLs you need to configure in your Entra ID application.
|
||||
|
||||

|
||||

|
||||
|
||||
1. Go to Microsoft Entra > Manage > Single sign-on
|
||||
2. Edit the "Basic SAML Configuration"
|
||||
|
@@ -23,8 +23,8 @@ import TestSetup from './_test_setup.mdx';
|
||||
2. Add your App Name, your Company Page and a Logo
|
||||
3. Add "Sign In with LinkedIn using OpenID Connect" by clicking "Request access"
|
||||
4. Go to the Auth Settings of the App and add the following URL to the "Authorized redirect URLs"
|
||||
- `{your_domain}/idps/callback`
|
||||
- Example redirect url for the domain `https://acme.zitadel.cloud` would look like this: `https://acme.zitadel.cloud/idps/callback`
|
||||
- `{your_domain}/ui/login/login/externalidp/callback`
|
||||
- Example redirect url for the domain `https://acme.zitadel.cloud` would look like this: `https://acme.zitadel.cloud/ui/login/login/externalidp/callback`
|
||||
5. Verify the app as your company
|
||||
6. In the Auth - OAuth 2.0 scopes section you should see `openid`, `profile` and `email` listed
|
||||
7. Save Client ID and Primary Client Secret from the Application credentials
|
||||
|
@@ -35,7 +35,7 @@ As an alternative you can add the SAML identity provider through the API, either
|
||||
|
||||
After you created the SAML Provider in ZITADEL, you can copy the URLs you need to configure in your OKTA application.
|
||||
|
||||

|
||||

|
||||
|
||||
## OKTA Configuration
|
||||
|
||||
|
BIN
docs/static/img/guides/azure_app_redirects.png
vendored
Normal file
After Width: | Height: | Size: 127 KiB |
BIN
docs/static/img/guides/azure_app_register.png
vendored
Normal file
After Width: | Height: | Size: 85 KiB |
BIN
docs/static/img/guides/azure_app_registration.png
vendored
Before Width: | Height: | Size: 119 KiB After Width: | Height: | Size: 327 KiB |
Before Width: | Height: | Size: 87 KiB After Width: | Height: | Size: 116 KiB |
BIN
docs/static/img/guides/gitlab_app_id_secret.png
vendored
Before Width: | Height: | Size: 87 KiB After Width: | Height: | Size: 103 KiB |
BIN
docs/static/img/guides/gitlab_app_registration.png
vendored
Before Width: | Height: | Size: 339 KiB After Width: | Height: | Size: 253 KiB |
Before Width: | Height: | Size: 94 KiB After Width: | Height: | Size: 99 KiB |
Before Width: | Height: | Size: 97 KiB After Width: | Height: | Size: 46 KiB |
BIN
docs/static/img/guides/zitadel_azure_provider2.png
vendored
Before Width: | Height: | Size: 96 KiB After Width: | Height: | Size: 45 KiB |
BIN
docs/static/img/guides/zitadel_azure_saml_provider_urls.png
vendored
Normal file
After Width: | Height: | Size: 95 KiB |
Before Width: | Height: | Size: 96 KiB After Width: | Height: | Size: 46 KiB |
Before Width: | Height: | Size: 90 KiB After Width: | Height: | Size: 44 KiB |
Before Width: | Height: | Size: 90 KiB After Width: | Height: | Size: 43 KiB |
Before Width: | Height: | Size: 94 KiB After Width: | Height: | Size: 44 KiB |
BIN
docs/static/img/guides/zitadel_okta_saml_provider_urls.png
vendored
Normal file
After Width: | Height: | Size: 75 KiB |
Before Width: | Height: | Size: 98 KiB |