Skip to content

Commit

Permalink
Merge pull request #1261 from denhamparry/fix/aad-backslashes
Browse files Browse the repository at this point in the history
fix: add missing backslashes
  • Loading branch information
ltagliaferri authored Dec 22, 2023
2 parents d4267b4 + d4e051b commit c2ce1ee
Show file tree
Hide file tree
Showing 4 changed files with 33 additions and 33 deletions.
20 changes: 10 additions & 10 deletions content/chainguard/administration/custom-idps/azure-ad/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ images: []
weight: 020
---

The Chainguard platform supports Single sign-on (SSO) authentication for users. By default, users can log in with GitHub, GitLab and Google, but SSO support allows users to bring their own identity provider for authentication.
The Chainguard platform supports Single sign-on (SSO) authentication for users. By default, users can log in with GitHub, GitLab and Google, but SSO support allows users to bring their own identity provider for authentication.

This guide outlines how to create an Azure Active Directory (AD) Application and integrate it with Chainguard. After completing this guide, you'll be able to log in to Chainguard using Azure AD and will no longer be limited to the default SSO options.

Expand All @@ -22,12 +22,12 @@ This guide outlines how to create an Azure Active Directory (AD) Application and
To complete this guide, you will need the following.

* `chainctl` installed on your system. Follow our guide on [How To Install `chainctl`](/chainguard/chainguard-enforce/how-to-install-chainctl/) if you don't already have this installed.
* An Azure account you can use to set up an Active Directory Application.
* An Azure account you can use to set up an Active Directory Application.


## Create an Azure Active Directory Application

To integrate the Azure AD identity provider with the Chainguard platform, log in to [Azure](https://azure.microsoft.com) and navigate to the Azure Active Directory console in the Azure portal.
To integrate the Azure AD identity provider with the Chainguard platform, log in to [Azure](https://azure.microsoft.com) and navigate to the Azure Active Directory console in the Azure portal.

![Screenshot of the Azure portal's sidebar menu, with Azure Active Directory highlighted in a red circle.](aad-1.png)

Expand All @@ -47,7 +47,7 @@ Save your configuration by clicking the **Register** button.

Next, you can optionally set additional branding for the application by selecting the **Branding and properties** tab.

There, you can set additional metadata for the application, including a Chainguard logo icon here to help your users visually identify this integration. If you'd like, you can use the icon from the [Chainguard Console](https://console.enforce.dev/logo512.png). The console homepage is [console.enforce.dev](https://console.enforce.dev), and our terms of service and private statements can be found at [chainguard.dev/terms-of-service](https://www.chainguard.dev/terms-of-service) and [chainguard.dev/privacy-notice](https://www.chainguard.dev/privacy-notice), respectively.
There, you can set additional metadata for the application, including a Chainguard logo icon here to help your users visually identify this integration. If you'd like, you can use the icon from the [Chainguard Console](https://console.enforce.dev/logo512.png). The console homepage is [console.enforce.dev](https://console.enforce.dev), and our terms of service and private statements can be found at [chainguard.dev/terms-of-service](https://www.chainguard.dev/terms-of-service) and [chainguard.dev/privacy-notice](https://www.chainguard.dev/privacy-notice), respectively.

![Screenshot of the Branding & properties screen with the following settings: Name is set to "Chainguard"; Logo shows the sample Inky logo uploaded; Home page URL is set to "https://console.enforce.dev"; Terms of service URL is set to "https://www.chainguard.dev/terms-of-service"; and the Privacy statement URL is set to "https://www.chainguard.dev/privacy-notice".](aad-branding.png)

Expand Down Expand Up @@ -90,13 +90,13 @@ You can retrieve a list of all your Chainguard groups — along with their UIDPs
chainctl iam groups ls -o table
```
```output
ID | NAME | DESCRIPTION
ID | NAME | DESCRIPTION
------------------------------------------------------------+-----------------+---------------------
59156e77fb23e1e5ebcb1bd9c5edae471dd85c43 | sample_group |
59156e77fb23e1e5ebcb1bd9c5edae471dd85c43 | sample_group |
. . . | . . . |
```

Note down the `ID` value for your chosen group.
Note down the `ID` value for your chosen group.

With this information in hand, create a new identity provider with the following commands.

Expand All @@ -113,12 +113,12 @@ chainctl iam identity-provider create \
--oidc-issuer=${ISSUER} \
--oidc-additional-scopes=email \
--oidc-additional-scopes=profile \
--group=${GROUP}
--default-role=viewer
--group=${GROUP} \
--default-role=viewer \
--name=${NAME}
```

Note the `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. If you don't include this option, you'll be prompted to specify the role interactively. For more information, refer to the [IAM and Security section](/chainguard/chainguard-enforce/authentication/custom-idps/#iam-and-security) of our Introduction to Custom Identity Providers in Chainguard tutorial.
Note the `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. If you don't include this option, you'll be prompted to specify the role interactively. For more information, refer to the [IAM and Security section](/chainguard/chainguard-enforce/authentication/custom-idps/#iam-and-security) of our Introduction to Custom Identity Providers in Chainguard tutorial.


You can refer to our [Generic Integration Guide](/chainguard/administration/custom-idps/custom-idps/#generic-integration-guide) in our Introduction to Custom Identity Providers doc for more information about the `chainctl iam identity-provider create` command and its required options.
Original file line number Diff line number Diff line change
Expand Up @@ -160,26 +160,26 @@ chainctl iam identity-provider create \
--oidc-issuer=${ISSUER} \
--oidc-additional-scopes=email \
--oidc-additional-scopes=profile \
--group=${GROUP}
--default-role=viewer
--group=${GROUP} \
--default-role=viewer \
--name=${NAME}
```

The `oidc-issuer`, `oidc-client-id`, and `oidc-issuer-secret` values are required when setting up an OIDC configuration with `chainctl`. You must also include a unique name for each custom IDP account.
The `oidc-issuer`, `oidc-client-id`, and `oidc-issuer-secret` values are required when setting up an OIDC configuration with `chainctl`. You must also include a unique name for each custom IDP account.

Be aware that if you don't include the `--group` or `--default-role` options in the command, you will be prompted to select these values interactively.
Be aware that if you don't include the `--group` or `--default-role` options in the command, you will be prompted to select these values interactively.

The `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. For more information, refer to the [IAM and Security section](/#iam-and-security).
The `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. For more information, refer to the [IAM and Security section](/#iam-and-security).

The `--group` option specifies which Chainguard IAM group your identity provider will be installed under. You can retrieve a list of all your Chainguard groups — along with their UIDPs — with the following command.

```shell
chainctl iam groups ls -o table
```
```output
ID | NAME | DESCRIPTION
ID | NAME | DESCRIPTION
------------------------------------------------------------+-----------------+---------------------
59156e77fb23e1e5ebcb1bd9c5edae471dd85c43 | sample_group |
59156e77fb23e1e5ebcb1bd9c5edae471dd85c43 | sample_group |
. . . | . . . |
```

Expand Down
12 changes: 6 additions & 6 deletions content/chainguard/administration/custom-idps/okta/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,13 +85,13 @@ You can retrieve a list of all your Chainguard groups — along with their UIDPs
chainctl iam groups ls -o table
```
```output
ID | NAME | DESCRIPTION
ID | NAME | DESCRIPTION
------------------------------------------------------------+-----------------+---------------------
59156e77fb23e1e5ebcb1bd9c5edae471dd85c43 | sample_group |
59156e77fb23e1e5ebcb1bd9c5edae471dd85c43 | sample_group |
. . . | . . . |
```

Note down the `ID` value for your chosen group.
Note down the `ID` value for your chosen group.

With this information in hand, create a new identity provider with the following commands.

Expand All @@ -108,11 +108,11 @@ chainctl iam identity-provider create \
--oidc-issuer=${ISSUER} \
--oidc-additional-scopes=email \
--oidc-additional-scopes=profile \
--group=${GROUP}
--default-role=viewer
--group=${GROUP} \
--default-role=viewer \
--name=${NAME}
```

Note the `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. If you don't include this option, you'll be prompted to specify the role interactively. For more information, refer to the [IAM and Security section](/chainguard/chainguard-enforce/authentication/custom-idps/#iam-and-security) of our Introduction to Custom Identity Providers in Chainguard tutorial.
Note the `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. If you don't include this option, you'll be prompted to specify the role interactively. For more information, refer to the [IAM and Security section](/chainguard/chainguard-enforce/authentication/custom-idps/#iam-and-security) of our Introduction to Custom Identity Providers in Chainguard tutorial.

You can refer to our [Generic Integration Guide](/chainguard/administration/custom-idps/custom-idps/#generic-integration-guide) in our Introduction to Custom Identity Providers article for more information about the `chainctl iam identity-provider create` command and its required options.
20 changes: 10 additions & 10 deletions content/chainguard/administration/custom-idps/ping-id/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ images: []
weight: 015
---

The Chainguard platform supports Single sign-on (SSO) authentication for users. By default, users can log in with GitHub, GitLab and Google, but SSO support allows users to bring their own identity provider for authentication.
The Chainguard platform supports Single sign-on (SSO) authentication for users. By default, users can log in with GitHub, GitLab and Google, but SSO support allows users to bring their own identity provider for authentication.

This guide outlines how to create a Ping Identity Application and integrate it with Chainguard. After completing this guide, you'll be able to log in to Chainguard using Ping and will no longer be limited to the default SSO options.

Expand All @@ -22,7 +22,7 @@ This guide outlines how to create a Ping Identity Application and integrate it w
To complete this guide, you will need the following.

* `chainctl` installed on your system. Follow our guide on [How To Install `chainctl`](/chainguard/chainguard-enforce/how-to-install-chainctl/) if you don't already have this installed.
* A Ping Identity account over which you have administrative access.
* A Ping Identity account over which you have administrative access.


## Create a Ping Identity Application
Expand Down Expand Up @@ -62,7 +62,7 @@ To configure the application, add the following settings.

![Screenshot of the Edit Configuration modal window with the following settings: Resource type is set to "Code"; Grant type is set to "Authorization Code" (with PKCE enforcement set to "Optional"); Redirect URIs has one option set (https://issuer.enforce.dev/oauth/callback).](ping-7-edit-conf.png)

Click the **Save** button to save your configuration.
Click the **Save** button to save your configuration.

Finally, enable the Chainguard application by toggling the knob in the top right corner.

Expand All @@ -85,7 +85,7 @@ Note that this bootstrap account can be used as a [backup account](/chainguard/c

To configure Chainguard make a note of the following settings from your Ping application. These can be found in the Ping console under the **Configuration** tab of the **Application** page.

* Client ID
* Client ID
* Client Secret
* Issuer URL

Expand All @@ -97,13 +97,13 @@ You can retrieve a list of all your Chainguard groups — along with their UIDPs
chainctl iam groups ls -o table
```
```output
ID | NAME | DESCRIPTION
ID | NAME | DESCRIPTION
------------------------------------------------------------+-----------------+---------------------
59156e77fb23e1e5ebcb1bd9c5edae471dd85c43 | sample_group |
59156e77fb23e1e5ebcb1bd9c5edae471dd85c43 | sample_group |
. . . | . . . |
```

Note down the `ID` value for your chosen group.
Note down the `ID` value for your chosen group.

With this information in hand, create a new identity provider with the following commands.

Expand All @@ -120,12 +120,12 @@ chainctl iam identity-provider create \
--oidc-issuer=${ISSUER} \
--oidc-additional-scopes=email \
--oidc-additional-scopes=profile \
--group=${GROUP}
--default-role=viewer
--group=${GROUP} \
--default-role=viewer \
--name=${NAME}
```

Note the `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. If you don't include this option, you'll be prompted to specify the role interactively. For more information, refer to the [IAM and Security section](/chainguard/chainguard-enforce/authentication/custom-idps/#iam-and-security) of our Introduction to Custom Identity Providers in Chainguard tutorial.
Note the `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. If you don't include this option, you'll be prompted to specify the role interactively. For more information, refer to the [IAM and Security section](/chainguard/chainguard-enforce/authentication/custom-idps/#iam-and-security) of our Introduction to Custom Identity Providers in Chainguard tutorial.


You can refer to our [Generic Integration Guide](/chainguard/administration/custom-idps/custom-idps/#generic-integration-guide) in our Introduction to Custom Identity Providers guide for more information about the `chainctl iam identity-provider create` command and its required options.

0 comments on commit c2ce1ee

Please sign in to comment.