diff --git a/docs/hub/security-sso-okta-oidc.md b/docs/hub/security-sso-okta-oidc.md
index 2f3dc260b..adcb0821b 100644
--- a/docs/hub/security-sso-okta-oidc.md
+++ b/docs/hub/security-sso-okta-oidc.md
@@ -68,9 +68,8 @@ The Okta Issuer URL is generally a URL like `https://tenantId.okta.com`; you can
In the SSO section of your organization's settings on Hugging Face, copy-paste these values from Okta:
-- Sign-on URL
-- SP Entity ID
-- Public certificate
+- Client ID
+- Client Secret
diff --git a/docs/hub/security-sso-okta-saml.md b/docs/hub/security-sso-okta-saml.md
index 25b21bfa4..2cab374de 100644
--- a/docs/hub/security-sso-okta-saml.md
+++ b/docs/hub/security-sso-okta-saml.md
@@ -2,7 +2,7 @@
In this guide, we will use Okta as the SSO provider and with the Security Assertion Markup Language (SAML) protocol as our preferred identity protocol.
-We currently only support SP-initiated authentication. IdP-initiated login and user provisioning is not supported at this time.
+We currently support SP-initiated and IdP-initiated authentication. User provisioning is not yet supported at this time.
This feature is part of the Enterprise Hub.
diff --git a/docs/hub/security-sso.md b/docs/hub/security-sso.md
index 36b2f9bb8..12c9b62b9 100644
--- a/docs/hub/security-sso.md
+++ b/docs/hub/security-sso.md
@@ -29,7 +29,7 @@ We support [role mapping](#role-mapping): you can automatically assign [roles](.
### Supported Identity Providers
-You can easily integrate Hugging Face Hub with a variety of Identity Providers, such as Okta, OneLogin or Azure Active Directory (Azure AD). Hugging Face Hub can work with any OIDC-compliant or SAML (*SP Initiated*) Identity Provider.
+You can easily integrate Hugging Face Hub with a variety of Identity Providers, such as Okta, OneLogin or Azure Active Directory (Azure AD). Hugging Face Hub can work with any OIDC-compliant or SAML Identity Provider.
## How to configure OIDC/SAML provider in the Hub