Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove sp initiated mentions from SSO pages #1014

Merged
merged 2 commits into from
Oct 11, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 2 additions & 3 deletions docs/hub/security-sso-okta-oidc.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,9 +68,8 @@ The Okta Issuer URL is generally a URL like `https://tenantId.okta.com`; you can

In the SSO section of your organization's settings on Hugging Face, copy-paste these values from Okta:

- Sign-on URL
- SP Entity ID
- Public certificate
- Client ID
- Client Secret

<div class="flex justify-center">
<img class="block dark:hidden" src="https://huggingface.co/datasets/huggingface/documentation-images/resolve/main/hub/sso/sso-okta-guide-5.png"/>
Expand Down
2 changes: 1 addition & 1 deletion docs/hub/security-sso-okta-saml.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

In this guide, we will use Okta as the SSO provider and with the Security Assertion Markup Language (SAML) protocol as our preferred identity protocol.

We currently only support SP-initiated authentication. IdP-initiated login and user provisioning is not supported at this time.
We currently support SP-initiated and IdP-initiated authentication. User provisioning is not yet supported at this time.

<Tip warning={true}>
This feature is part of the <a href="https://huggingface.co/enterprise" target="_blank">Enterprise Hub</a>.
Expand Down
2 changes: 1 addition & 1 deletion docs/hub/security-sso.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ We support [role mapping](#role-mapping): you can automatically assign [roles](.

### Supported Identity Providers

You can easily integrate Hugging Face Hub with a variety of Identity Providers, such as Okta, OneLogin or Azure Active Directory (Azure AD). Hugging Face Hub can work with any OIDC-compliant or SAML (*SP Initiated*) Identity Provider.
You can easily integrate Hugging Face Hub with a variety of Identity Providers, such as Okta, OneLogin or Azure Active Directory (Azure AD). Hugging Face Hub can work with any OIDC-compliant or SAML Identity Provider.

## How to configure OIDC/SAML provider in the Hub

Expand Down
Loading