diff --git a/docs/docs/apis/actions/external-authentication.md b/docs/docs/apis/actions/external-authentication.md index 54188446f9..94cd7f9203 100644 --- a/docs/docs/apis/actions/external-authentication.md +++ b/docs/docs/apis/actions/external-authentication.md @@ -2,7 +2,7 @@ title: External Authentication Flow --- -This flow is executed if the user logs in using an [identity provider](/guides/integrate/identity-providers) or using a [jwt token](/concepts/structure/jwt_idp). +This flow is executed if the user logs in using an [identity provider](/guides/integrate/identity-providers) or using a [jwt token](/guides/integrate/identity-providers/jwt-idp). The flow is represented by the following Ids in the API: `FLOW_TYPE_EXTERNAL_AUTHENTICATION` and `1` diff --git a/docs/docs/concepts/structure/jwt_idp.md b/docs/docs/guides/integrate/identity-providers/jwt-idp.md similarity index 98% rename from docs/docs/concepts/structure/jwt_idp.md rename to docs/docs/guides/integrate/identity-providers/jwt-idp.md index 80f1f71764..5f2c7b29cf 100644 --- a/docs/docs/concepts/structure/jwt_idp.md +++ b/docs/docs/guides/integrate/identity-providers/jwt-idp.md @@ -2,7 +2,6 @@ title: JWT IDP --- - # JWT IDP JSON Web Token Identity Provider (JWT IDP) gives you the possibility to use an (existing) JWT as federated identity. @@ -17,7 +16,7 @@ All you need to provide is an endpoint where ZITADEL can receive a JWT and some The authentication process then might look like the following: -![JWT IDP Architecture](/img/concepts/objects/jwt_idp.png) +![JWT IDP Architecture](/img/guides/jwt_idp.png) 1. The user is logged into the existing application and the WAF holds the session information. It might even send a JWT to the application. The new application is opened by clicking on a link in the existing application. diff --git a/docs/sidebars.js b/docs/sidebars.js index 0c7dd3f1d1..5304d867b4 100644 --- a/docs/sidebars.js +++ b/docs/sidebars.js @@ -356,6 +356,7 @@ module.exports = { "guides/integrate/identity-providers/okta-saml", "guides/integrate/identity-providers/keycloak", "guides/integrate/identity-providers/mocksaml", + "guides/integrate/identity-providers/jwt-idp", "guides/integrate/identity-providers/additional-information", ], }, diff --git a/docs/static/img/concepts/objects/jwt_idp.png b/docs/static/img/guides/jwt_idp.png similarity index 100% rename from docs/static/img/concepts/objects/jwt_idp.png rename to docs/static/img/guides/jwt_idp.png diff --git a/docs/vercel.json b/docs/vercel.json index dbd5e94113..37fdd52363 100644 --- a/docs/vercel.json +++ b/docs/vercel.json @@ -27,6 +27,8 @@ { "source": "/docs/guides/integrate/logout", "destination": "/docs/guides/integrate/login/oidc/logout", "permanent": true }, { "source": "/docs/guides/solution-scenarios/onboarding", "destination": "/docs/guides/integrate/onboarding", "permanent": true }, { "source": "/docs/guides/solution-scenarios/onboarding/b2b", "destination": "/docs/guides/integrate/onboarding/b2b", "permanent": true }, - { "source": "/docs/guides/solution-scenarios/onboarding/end-users", "destination": "/docs/guides/integrate/onboarding/end-users", "permanent": true } + { "source": "/docs/guides/solution-scenarios/onboarding/end-users", "destination": "/docs/guides/integrate/onboarding/end-users", "permanent": true }, + { "source": "/docs/concepts/structure/jwt_idp", "destination": "/docs/guides/integrate/identity-providers/jwt-idp", "permanent": true }, + { "source": "/docs/concepts/structure/jwt-idp", "destination": "/docs/guides/integrate/identity-providers/jwt-idp", "permanent": true } ] }