Skip to content

Commit 75e93ca

Browse files
authored
website/integrations: random fixes (#17631)
* Change miniflux and espo-crm formatting * Fixes capitalization, bolding and wording.
1 parent 7a98b64 commit 75e93ca

File tree

39 files changed

+45
-44
lines changed

39 files changed

+45
-44
lines changed

website/integrations/chat-communication-collaboration/espo-crm/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,9 @@ To support the integration of EspoCRM with authentik, you need to create an appl
3838
- **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type.
3939
- **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations.
4040
- Note the **Client ID**, **Client Secret**, and **slug** values because they will be required later.
41-
- Set a `Strict` redirect URI to <kbd>https://<em>espocrm.company</em>/oauth-callback.php</kbd>.
41+
- Set a `Strict` redirect URI to `https://espocrm.company/oauth-callback.php`.
4242
- Select any available signing key.
43-
- Under **Advanced Protocol Settings**, set **Subject mode** to be `Based on the Users's username`.
43+
- Under **Advanced protocol settings**, set **Subject mode** to be `Based on the Users's username`.
4444
- **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
4545

4646
3. Click **Submit** to save the new application and provider.

website/integrations/chat-communication-collaboration/kimai/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To support the integration of Kimai with authentik, you need to create an applic
3838
- Set the **Issuer** to `https://authentik.company`.
3939
- Set the **Service Provider Binding** to `Post`.
4040
- Set the **Audience** to `https://kimai.company/auth/saml`.
41-
- Under **Advanced protocol settings**, select an available signing certificate.
41+
- Under **Advanced protocol settings**, select an available **Signing certificate**.
4242
- **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
4343

4444
3. Click **Submit** to save the new application and provider.

website/integrations/chat-communication-collaboration/mautic/index.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,8 +73,7 @@ Because Mautic requires a first name and last name attribute, create two [SAML p
7373
- Set the **ACS URL** to `https://mautic.company/s/saml/login_check`
7474
- Set the **Issuer** to `mautic.company`
7575
- Set the **Service Provider Binding** to `Post`
76-
- Under **Advanced protocol settings** set the **Signing Certificate** to `authentik Self-signed Certificate` and check **Sign assertions** and **Sign responses**
77-
- Under **Advanced protocol settings** add the newly created property mappings `SAML-FirstName-from-Name` and `SAML-LastName-from-Name` under **Property Mappings**. **Property Mappings**.
76+
- Under **Advanced protocol settings**, select an available **Signing certificate**, check **Sign assertions** and **Sign responses**, and add the two **Property Mappings** you created in the previous section.
7877
3. Click **Submit** to save the new application and provider.
7978
4. Go to **Applications** > **Providers** and click on `mautic-provider`.
8079
- Under **Metadata** click on **Download** to save the file as `mautic-provider\_authentik_meta.xml`.

website/integrations/chat-communication-collaboration/nextcloud/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ To connect to an existing Nextcloud user, set the `nextcloud_user_id` attribute
122122
- Note the **Client ID** and **slug** values because they will be required later.
123123
- Set a `Strict` redirect URI to `https://nextcloud.company/apps/user_oidc/code`.
124124
- Select any available signing key.
125-
- Under **Advanced Protocol Settings**:
125+
- Under **Advanced protocol settings**:
126126
- _(optional)_ If you created the `Nextcloud Profile` scope mapping, add it to **Selected Scopes**.
127127
- **Subject Mode**: `Based on the User's UUID`
128128
- **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
@@ -210,7 +210,7 @@ If you require [server side encryption](https://docs.nextcloud.com/server/latest
210210
- Set the **Issuer** to `https://authentik.company`.
211211
- Set the **Audience** to `https://nextcloud.company/apps/user_saml/saml/metadata`.
212212
- Set the **Service Provider Binding** to `Post`.
213-
- Under **Advanced protocol settings**, set an available signing certificate.
213+
- Under **Advanced protocol settings**, set an available **Signing certificate**.
214214
- **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
215215

216216
3. Click **Submit** to save the new application and provider.

website/integrations/chat-communication-collaboration/slack/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ To support the integration of Slack with authentik, you need to create an applic
5151
- Set the **ACS URL** to `https://company.slack.com/sso/saml`.
5252
- Set the **Issuer** to `https://slack.com`.
5353
- Set the **Service Provider Binding** to `Post`.
54-
- Under **Advanced protocol settings**, add the two **Property Mappings** you created in the previous section, then select a **Signing Certificate**.
54+
- Under **Advanced protocol settings**, select an available **Signing certificate** and add the two **Property Mappings** you created in the previous section.
5555
- **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
5656

5757
3. Click **Submit** to save the new application and provider.

website/integrations/chat-communication-collaboration/zulip/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ To support the integration of Zulip with authentik, you need to create an applic
3636
- Set the **ACS URL** to `https://zulip.company/complete/saml/`.
3737
- Set the **Issuer** to `https://authentik.company`.
3838
- Set the **Service Provider Binding** to `Post`.
39-
- Under **Advanced protocol settings**, select an available signing certificate.
39+
- Under **Advanced protocol settings**, select an available **Signing certificate**.
4040
- **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
4141

4242
3. Click **Submit** to save the new application and provider.

website/integrations/cloud-providers/aws/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ To support the integration of AWS with authentik using IAM Identity Center, you
126126
- **Configure the Provider**: provide a name (or accept the auto-provided name), and configure the following required settings:
127127
- Upload the metadata file from AWS (obtained in AWS Configuration steps)
128128
- Copy the **Issuer URL** to the **Audience** field
129-
- Under **Advanced Protocol Settings**, set your **Signing Certificate**
129+
- Under **Advanced protocol settings**, select an available **Signing certificate**.
130130
- **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
131131

132132
3. Click **Submit** to save the new application and provider.

website/integrations/cloud-providers/hashicorp-cloud/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To support the integration of HashiCorp Cloud with authentik, you need to create
4040
- Set the **ACS URL** to the value of `SSO Sign-On URL` in the **HashiCorp Cloud preparation** section.
4141
- Set the **Issuer** and **Audience** to the value of `Entity ID` in the **HashiCorp Cloud preparation** section.
4242
- Set the **Service Provider Binding** to `Post`.
43-
- Under **Advanced protocol settings**, select an available signing certificate.
43+
- Under **Advanced protocol settings**, select an available **Signing certificate**.
4444
3. Click **Submit** to save the new application and provider.
4545

4646
## HashiCorp Cloud configuration

website/integrations/cloud-providers/ovhcloud/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ To support the integration of OVHcloud with authentik, you need to create an app
3232
- `https://www.ovhcloud.com/ca/auth/saml/acs` for CA region.
3333
- `https://us.ovhcloud.com/auth/` for US region.
3434
- Set the **Service Provider Binding** to `Post`.
35-
- Under **Advanced protocol settings**, set an available signing certificate.
35+
- Under **Advanced protocol settings**, set an available **Signing certificate**.
3636

3737
- **Configure Bindings** _(optional)_: You can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
3838

website/integrations/development/engomo/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To support the integration of Engomo with authentik, you need to create an appli
4848
- Set the **Client type** to `Public`.
4949
- Add two `Strict` redirect URIs and set them to `https://engomo.company/auth` and `com.engomo.engomo://callback/`.
5050
- Select any available signing key.
51-
- Under **Advanced Protocol Settings**, add the scope you just created to the list of available scopes.
51+
- Under **Advanced protocol settings**, add the scope you just created to the list of available scopes.
5252
- **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
5353

5454
3. Click **Submit** to save the new application and provider.

0 commit comments

Comments
 (0)