Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(sso): remove outdated instructions #8127

Draft
wants to merge 2 commits into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 2 additions & 5 deletions app/konnect/org-management/okta-idp.md
Original file line number Diff line number Diff line change
Expand Up @@ -306,12 +306,9 @@ in Okta to locate the Okta groups you want to map.

1. Click **Save**.

## Test and apply the configuration {#test-the-integration}
## Verify via SSO Login {#test-the-integration}

{:.important}
> **Important:** Keep built-in authentication enabled while you are testing Okta authentication. Only disable built-in authentication after successfully testing Okta authentication.

You can test the Okta configuration by navigating to the login URI based on the Organization Login Path you set earlier. For example: `cloud.konghq.com/login/examplepath`. You will see the Okta sign in window if your configuration is set up correctly.
You can verify the Okta configuration by navigating to the login URI based on the organization login path you set earlier. For example: `cloud.konghq.com/login/examplepath`. You will see the Okta sign in window if your configuration is set up correctly.

You can now manage your organization's user permissions entirely from the Okta
application.
Expand Down
8 changes: 2 additions & 6 deletions app/konnect/org-management/sso.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,22 +67,18 @@ The {{site.konnect_short_name}} SAML integration allows you to configure various
1. After clicking **Save**, configure the SP Entity ID and Login URL on your SAML IdP.
{% endnavtab %}
{% endnavtabs %}
## Test and apply the configuration
## Verify via SSO Login
{% navtabs %}
{% navtab OIDC%}
{:.important}
> **Important:** Keep built-in authentication enabled while you are testing IdP authentication. Only disable built-in authentication after successfully testing IdP authentication.

You can test the SSO configuration by navigating to the login URI based on the organization login path you set earlier. For example: `https://cloud.konghq.com/login/examplepath`, where `examplepath` is the unique login path string set in the steps above.
You can verify the SSO configuration by navigating to the login URI based on the organization login path you set earlier. For example: `https://cloud.konghq.com/login/examplepath`, where `examplepath` is the unique login path string set in the steps above.

If your configuration is set up correctly, you will see the IdP sign-in page.

You can now manage your organization's user permissions entirely from the IdP
application.
{% endnavtab %}
{% navtab SAML %}
{:.important}
> **Important:** Keep built-in authentication enabled while you are testing IdP authentication. Only disable built-in authentication after successfully testing IdP authentication.

Test the SSO configuration by navigating to the login URI based on the organization login path you set earlier. For example: `https://cloud.konghq.com/login/examplepath`, where `examplepath` is the unique login path string set in the previous steps.

Expand Down
Loading