docs: Identity providers and customer portal (#3790)
* docs: identity provider and customer portal page * docs: identity provider and customer portal page * docs: identity provider and customer portal page * docs: urls
@ -25,7 +25,7 @@ So your request might look like this (linebreaks and whitespace for display reas
|
||||
|
||||
```curl
|
||||
curl --request GET \
|
||||
--url 'https://accounts.zitadel.ch/oauth/v2/authorize
|
||||
--url '{your-domain}/oauth/v2/authorize
|
||||
?client_id=${client_id}
|
||||
&redirect_uri=${redirect_uri}
|
||||
&response_type=code
|
||||
@ -69,7 +69,7 @@ So check [Client Secret Basic Auth Method](/docs/apis/openidoauth/authn-methods#
|
||||
|
||||
```curl
|
||||
curl --request POST \
|
||||
--url https://api.zitadel.ch/oauth/v2/token \
|
||||
--url {your-domain}/oauth/v2/token \
|
||||
--header 'Authorization: Basic ${basic}' \
|
||||
--header 'Content-Type: application/x-www-form-urlencoded' \
|
||||
--data grant_type=authorization_code \
|
||||
|
@ -25,7 +25,7 @@ So your request might look like this (linebreaks and whitespace for display reas
|
||||
|
||||
```curl
|
||||
curl --request GET \
|
||||
--url 'https://accounts.zitadel.ch/oauth/v2/authorize
|
||||
--url '{your-domain}/oauth/v2/authorize
|
||||
?client_id=${client_id}
|
||||
&redirect_uri=${redirect_uri}
|
||||
&response_type=code
|
||||
@ -69,7 +69,7 @@ for us to validate the signature against the registered public key:
|
||||
|
||||
```curl
|
||||
curl --request POST \
|
||||
--url https://api.zitadel.ch/oauth/v2/token \
|
||||
--url {your-domain}/oauth/v2/token \
|
||||
--header 'Content-Type: application/x-www-form-urlencoded' \
|
||||
--data grant_type=authorization_code \
|
||||
--data code=${code} \
|
||||
|
@ -33,7 +33,7 @@ The request would finally look like (linebreaks and whitespace for display reaso
|
||||
|
||||
```curl
|
||||
curl --request GET \
|
||||
--url 'https://accounts.zitadel.ch/oauth/v2/authorize
|
||||
--url '{your-domain}/oauth/v2/authorize
|
||||
?client_id=${client_id}
|
||||
&redirect_uri=${redirect_uri}
|
||||
&response_type=code
|
||||
@ -78,7 +78,7 @@ Send your `client_id` and the previously generated string as `code_verifier` for
|
||||
|
||||
```curl
|
||||
curl --request POST \
|
||||
--url https://api.zitadel.ch/oauth/v2/token \
|
||||
--url {your-domain}/oauth/v2/token \
|
||||
--header 'Content-Type: application/x-www-form-urlencoded' \
|
||||
--data grant_type=authorization_code \
|
||||
--data code=${code} \
|
||||
|
@ -53,7 +53,7 @@ Send your `client_id` and the previously generated string as `code_verifier` for
|
||||
|
||||
```curl
|
||||
curl --request POST \
|
||||
--url https://api.zitadel.ch/oauth/v2/token \
|
||||
--url {your-domain}/oauth/v2/token \
|
||||
--header 'Content-Type: application/x-www-form-urlencoded' \
|
||||
--data grant_type=authorization_code \
|
||||
--data code=${code} \
|
||||
|
@ -51,8 +51,8 @@ In this exercise we will add a new Google identity provider to federate identiti
|
||||
|
||||
1. Register an OIDC Client in your preferred provider
|
||||
2. Make sure you add the ZITADEL callback redirect uris
|
||||
https://accounts.zitadel.ch/register/externalidp/callback
|
||||
https://accounts.zitadel.ch/login/externalidp/callback
|
||||
- {your-domain}/ui/login/register/externalidp/callback
|
||||
- {your-domain}/ui/login/login/externalidp/callback
|
||||
|
||||
> **Information:** Make sure the provider is OIDC 1.0 compliant with a proper Discovery Endpoint
|
||||
|
||||
@ -61,7 +61,9 @@ Google Example:
|
||||
1. Go to the Google Gloud Platform and choose youre project: <https://console.cloud.google.com/apis/credentials>
|
||||
2. Click on "+ CREATE CREDENTIALS" and choose "OAuth client ID"
|
||||
3. Choose Web application as Application type and give a name
|
||||
4. Add the redirect uris from above
|
||||
4. Add the redirect uris
|
||||
- {your-domain}/ui/login/register/externalidp/callback
|
||||
- {your-domain}/ui/login/login/externalidp/callback
|
||||
5. Save clientid and client secret
|
||||
|
||||

|
||||
@ -71,25 +73,26 @@ Google Example:
|
||||
The login policy can be configured on two levels. Once as default on the instance and this can be overwritten for each organization.
|
||||
This case describes how to change it on the organization.
|
||||
|
||||
1. Go to your organization settings by clicking on "Organization" in the menu or using the following link: <https://console.zitadel.ch/org>
|
||||
1. Go to your organization settings by clicking on "Organization" in the menu
|
||||
2. Modify your login policy in the menu "Login Behaviour and Security"
|
||||
|
||||

|
||||
|
||||
### 3.Configure new identity provider
|
||||
### 3. Configure new identity provider
|
||||
|
||||
1. Go to the identity providers section and click new
|
||||
2. Fill out the form
|
||||
- Use the issuer, clientid and client secret provided by your provider
|
||||
1. Go to the settings of your instance or a specific organization (depending on where you need the identity provider)
|
||||
2. Go to the identity providers section and click "New"
|
||||
3. Select "OIDC Configuration" and fill out the form
|
||||
- Use the issuer, clientid and client secret provided by your provider (Google Issuer: https://accounts.google.com)
|
||||
- The scopes will be prefilled with openid, profile and email, because this information is relevant for ZITADEL
|
||||
- You can choose what fields you like to map as the display name and as username. The fields you can choose are preferred_username and email
|
||||
(Example: For Google you should choose email for both fields)
|
||||
3. Save your configuration
|
||||
4. Link your new configuration to your login policy. By searching in the organization category you will get you own configuration. If you choose system you can link all predefined providers.
|
||||
4. Save your configuration
|
||||
5. You will now see the created configuration in the list. Click on the activate icon at the end of the row you can see when hovering over the row, to activate it in the login flow.
|
||||
|
||||

|
||||
|
||||
### 4.Send the primary domain scope on the authorization request
|
||||
### 4. Send the primary domain scope on the authorization request
|
||||
ZITADEL will show a set of identity providers by default. This configuration can be changed by users with the [manager role] (https://docs.zitadel.com/docs/concepts/zitadel/objects/managers) `IAM_OWNER`.
|
||||
|
||||
An organization's login settings will be shown
|
||||
@ -99,20 +102,9 @@ An organization's login settings will be shown
|
||||
To get your own configuration you will have to send the [primary domain scope](https://docs.zitadel.com/docs/apis/openidoauth/scopes#reserved-scopes) in your [authorization request](https://docs.zitadel.com/docs/guides/authentication/login-users/#auth-request) .
|
||||
The primary domain scope will restrict the login to your organization, so only users of your own organization will be able to login, also your branding and policies will trigger.
|
||||
|
||||
See the following link as an example. Users will be able to register and login to the organization that verified the @caos.ch domain only.
|
||||
```
|
||||
https://accounts.zitadel.ch/oauth/v2/authorize?client_id=69234247558357051%40zitadel&scope=openid%20profile%20urn%3Azitadel%3Aiam%3Aorg%3Adomain%3Aprimary%3Acaos.ch&redirect_uri=https%3A%2F%2Fconsole.zitadel.ch%2Fauth%2Fcallback&state=testd&response_type=code&nonce=test&code_challenge=UY30LKMy4bZFwF7Oyk6BpJemzVblLRf0qmFT8rskUW0
|
||||
```
|
||||
:::note
|
||||
|
||||
:::info
|
||||
|
||||
Make sure to replace the domain `caos.ch` with your own domain to trigger the correct branding.
|
||||
|
||||
:::
|
||||
|
||||
:::caution
|
||||
|
||||
This example uses the ZITADEL Cloud Application for demonstration. You need to create your own auth request with your applications parameters. Please see the docs to construct an [Auth Request](https://docs.zitadel.com/docs/guides/authentication/login-users/#auth-request).
|
||||
You need to create your own auth request with your applications parameters. Please see the docs to construct an [Auth Request](https://docs.zitadel.com/docs/guides/authentication/login-users/#auth-request).
|
||||
|
||||
:::
|
||||
|
||||
|
@ -68,7 +68,7 @@ import GrantedProjectDescription from '../../concepts/structure/_granted_project
|
||||
3. Select some roles you would like to grant to the organization ACME and confirm.
|
||||
4. You should now see ACME-CAOS in the section GRANTED ORGANIZATIONS
|
||||
|
||||

|
||||

|
||||
|
||||
## Knowledge Check (2)
|
||||
|
||||
|
21
docs/docs/manuals/customerportal/notifications.md
Normal file
@ -0,0 +1,21 @@
|
||||
---
|
||||
title: Notifications
|
||||
---
|
||||
|
||||
You can subscribe to different newsletters and notifications.
|
||||
|
||||
## Change Notification/Newsletter settings
|
||||
|
||||
1. Click on your user avatar in the top right
|
||||
2. In the menu that has opend you can see click on "Edit Notifications"
|
||||
3. You can see all the different newsletters and notifications and can now enable or disable them
|
||||
|
||||
|
||||

|
||||
|
||||
## Notifications
|
||||
|
||||
Onboarding: The onboarding list will provide you with some information when you first created your account
|
||||
Newsletter: The newsletter will contain any news about the company, the product and what happens around. (e.g Blogs, Funding, etc)
|
||||
Product News: You will get some news about the product, changes and new features
|
||||
Security: Security should possibly not be disabled, we will send some security relevant information and critical issues here.
|
@ -14,7 +14,6 @@ To get started, enter the following data:
|
||||
- Email
|
||||
- Username
|
||||
- Organization Name
|
||||
- Instance Name
|
||||
|
||||

|
||||
|
||||
|
BIN
docs/static/img/console_org_identitiy_provider.gif
vendored
Normal file
After Width: | Height: | Size: 3.7 MiB |
BIN
docs/static/img/console_org_identity_provider.gif
vendored
Before Width: | Height: | Size: 3.0 MiB After Width: | Height: | Size: 3.3 MiB |
BIN
docs/static/img/google_add_credentials.gif
vendored
Before Width: | Height: | Size: 1.7 MiB After Width: | Height: | Size: 2.3 MiB |
Before Width: | Height: | Size: 1.2 MiB After Width: | Height: | Size: 1.1 MiB |
BIN
docs/static/img/manuals/portal/customer_portal_notifications.png
vendored
Normal file
After Width: | Height: | Size: 195 KiB |
BIN
docs/static/img/projects_create_org_grant.gif
vendored
Normal file
After Width: | Height: | Size: 2.1 MiB |
Before Width: | Height: | Size: 7.5 MiB |