Skip to content

Commit

Permalink
Fixing 404 in PingID doc (#2008)
Browse files Browse the repository at this point in the history
[X] Check if this is a typo or other quick fix and ignore the rest :)

Resolves #1992

deploy preview link:
https://deploy-preview-2008--ornate-narwhal-088216.netlify.app/chainguard/administration/custom-idps/custom-idps/#setup-and-administration

## Type of change
<!-- Please be sure to add the appropriate label to your PR. -->

### What should this PR do?
<!-- Does this PR resolve an issue? Please include a reference to it.
-->

### Why are we making this change?
<!-- What larger problem does this PR address? -->

### What are the acceptance criteria? 
<!-- What should be happening for this PR to be accepted? Please list
criteria. -->
<!-- Do any stakeholders need to be tagged in this review? If so, please
add them. -->

### How should this PR be tested?
<!-- What should your reviewer do to test this PR? Please list steps.
-->

Signed-off-by: Mark Drake <[email protected]>
  • Loading branch information
SharpRake authored Jan 13, 2025
1 parent 543ed3a commit 74c0081
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ Chainguard SSO supports OpenID Connect (OIDC) compatible identity providers. In

Customer-managed identity providers must also have a public, unauthenticated OIDC discovery endpoint.

Typically, identity providers enable you to set up SSO by creating a specific resource on the provider's platform. For example, Ping Identity requires you to [add an application](https://docs.pingidentity.com/r/en-us/pingone/p1_c_applicationtypes), while Okta has you create [an app integration](https://help.okta.com/en-us/content/topics/apps/apps_apps.htm).
Typically, identity providers enable you to set up SSO by creating a specific resource on the provider's platform. For example, Ping Identity requires you to [add an application](https://docs.pingidentity.com/pingone/applications/p1_applications_add_applications.html), while Okta has you create [an app integration](https://help.okta.com/en-us/content/topics/apps/apps_apps.htm).

To set up SSO for your identity provider, you must configure one of these resources to use OIDC so that the Chainguard platform can interact with the provider. Following that, you have to configure the Chainguard platform to use that application.

Expand Down

0 comments on commit 74c0081

Please sign in to comment.