diff --git a/docs/authentication/enterprise-connections/oidc/custom-provider.mdx b/docs/authentication/enterprise-connections/oidc/custom-provider.mdx index 44478a399d..96879196e8 100644 --- a/docs/authentication/enterprise-connections/oidc/custom-provider.mdx +++ b/docs/authentication/enterprise-connections/oidc/custom-provider.mdx @@ -32,7 +32,7 @@ To make the setup process easier, it's recommended to keep two browser tabs open 1. Under **OpenID Connect (OIDC)**, select **Custom OIDC Provider**. 1. Add the **Name** of the connection. 1. Add the **Key** of the provider. This is the provider's unique identifier (cannot be changed after creation). - 1. Add the **Specific Domain** that you want to allow this connection for. This is the domain of the users you want to allow to sign in to your app. + 1. Enter the **Domain**. This is the email domain of the users you want to allow to sign in to your application. Optionally, select an **Organization**. 1. Select **Add connection**. You will be redirected to the connection's configuration page. Keep this page open. ## Configure your IdP @@ -40,6 +40,7 @@ To make the setup process easier, it's recommended to keep two browser tabs open 1. If necessary, create a new application in your IdP. 1. In the connection's configuration page of the Clerk Dashboard, copy the **Authorized redirect URI**. 1. Add the value to your IdP's whitelisted URLs. + 1. Find your application's **Discovery Endpoint**, **Client ID**, and **Client Secret** and copy them. ## Set the Discovery Endpoint, Client ID, and Client Secret in Clerk diff --git a/docs/references/backend/saml-connections/create-saml-connection.mdx b/docs/references/backend/saml-connections/create-saml-connection.mdx index f4ce452476..50bd8315a2 100644 --- a/docs/references/backend/saml-connections/create-saml-connection.mdx +++ b/docs/references/backend/saml-connections/create-saml-connection.mdx @@ -31,7 +31,7 @@ function createSamlConnection(params: CreateSamlConnectionParams): Promise