Skip to content
This repository has been archived by the owner on Nov 20, 2023. It is now read-only.

Commit

Permalink
pullrequest review notes
Browse files Browse the repository at this point in the history
  • Loading branch information
hendrik-hackerone committed Sep 28, 2023
1 parent c1e6abf commit 87053e5
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 5 deletions.
6 changes: 3 additions & 3 deletions docs/organizations/single-sign-on-sso-via-saml.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ HackerOne supports Single Sign-On (SSO) through Security Assertion Markup Langua
To configure Single Sign-On via SAML:
1. Go to **Organization Settings > Authentication > SAML (SSO)**.

><i>Note: You must be organization administrator to setup SAML.</i>
><i>Note: You must be an organization administrator to setup SAML.</i>
2. Click **Add SAML Provider**.

Expand Down Expand Up @@ -90,11 +90,11 @@ To configure an alternative certificate:

![SAML setup 11](./images/saml-sso-setup-9.png)

5. Enter the alternative certificate in the **Configure alternative certificate** window.
4. Enter the alternative certificate in the **Configure alternative certificate** window.

![SAML setup 12](./images/saml-sso-setup-10.png)

4. Click **Save**.
5. Click **Save**.

After the alternative certificate has been configured, users will be able to authenticate through the new SAML certificate.

Expand Down
2 changes: 1 addition & 1 deletion docs/organizations/sso-jit.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,5 +22,5 @@ Option Type | Details
----------- | -------
None | You can invite users to your program and manage their membership and permission level within the user management interface.
Basic | Enables any user attached to your SAML configuration to join the program automatically without an invitation at login. This works for multiple programs if your SAML settings are attached to all programs. <br><br>To configure this provisioning, contact support@hackerone.com after your SAML configuration is enabled and HackerOne will turn it on for you.
Advanced | *Only for Enterprise programs* <br><br>Enables organizations to control membership and permission level from their SSO provider. When configured, the attributes for the users membership and group will be used to assign the user to your program and the appropriate group in HackerOne with the associated permissions. You can confirm the memberships are being added properly by viewing your program [audit log](audit-logs.html).<br><br>To configure this provisioning, contact support@hackerone.com after your SAML configuration is enabled and HackerOne will assist in the setup.
Advanced | *Only for Enterprise programs* <br><br>Enables organizations to control membership and permission level from their SSO provider. When configured, the attributes for the users membership and group will be used to assign the user to your program and the appropriate group in HackerOne with the associated permissions. You can confirm the memberships are being added properly by viewing your program [audit log](audit-logs.html).<br><br>To configure this provisioning, contact support@hackerone.com after your SAML configuration is enabled, and HackerOne will assist in the setup.

2 changes: 1 addition & 1 deletion docs/organizations/verified-domains.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ In order to configure [single sign-on via SAML](single-sign-on-sso-via-saml.html
To verify your domain:
1. Go to **Organization Settings > Authentication > Verified Domains**.

><i>Note: You must be organization administrator to add a verified domain.</i>
><i>Note: You must be an organization administrator to add a verified domain.</i>
![verified domains1](./images/verified-domains-1.png)

Expand Down

0 comments on commit 87053e5

Please sign in to comment.