diff --git a/docs/hub/security-sso-okta-oidc.md b/docs/hub/security-sso-okta-oidc.md index 2f3dc260b..adcb0821b 100644 --- a/docs/hub/security-sso-okta-oidc.md +++ b/docs/hub/security-sso-okta-oidc.md @@ -68,9 +68,8 @@ The Okta Issuer URL is generally a URL like `https://tenantId.okta.com`; you can In the SSO section of your organization's settings on Hugging Face, copy-paste these values from Okta: -- Sign-on URL -- SP Entity ID -- Public certificate +- Client ID +- Client Secret
diff --git a/docs/hub/security-sso-okta-saml.md b/docs/hub/security-sso-okta-saml.md index 25b21bfa4..2cab374de 100644 --- a/docs/hub/security-sso-okta-saml.md +++ b/docs/hub/security-sso-okta-saml.md @@ -2,7 +2,7 @@ In this guide, we will use Okta as the SSO provider and with the Security Assertion Markup Language (SAML) protocol as our preferred identity protocol. -We currently only support SP-initiated authentication. IdP-initiated login and user provisioning is not supported at this time. +We currently support SP-initiated and IdP-initiated authentication. User provisioning is not yet supported at this time. This feature is part of the Enterprise Hub. diff --git a/docs/hub/security-sso.md b/docs/hub/security-sso.md index 36b2f9bb8..12c9b62b9 100644 --- a/docs/hub/security-sso.md +++ b/docs/hub/security-sso.md @@ -29,7 +29,7 @@ We support [role mapping](#role-mapping): you can automatically assign [roles](. ### Supported Identity Providers -You can easily integrate Hugging Face Hub with a variety of Identity Providers, such as Okta, OneLogin or Azure Active Directory (Azure AD). Hugging Face Hub can work with any OIDC-compliant or SAML (*SP Initiated*) Identity Provider. +You can easily integrate Hugging Face Hub with a variety of Identity Providers, such as Okta, OneLogin or Azure Active Directory (Azure AD). Hugging Face Hub can work with any OIDC-compliant or SAML Identity Provider. ## How to configure OIDC/SAML provider in the Hub