From 7e4dd9daf4fe78b26cd9729cc43e9e931a7423cb Mon Sep 17 00:00:00 2001 From: Karl Cardenas Date: Sat, 11 Jan 2025 07:34:13 -0700 Subject: [PATCH] docs: DOC-1588 --- .../cluster-management/palette-webctl.md | 128 ------------------ .../saml-sso/palette-sso-with-adfs.md | 9 +- .../saml-sso/palette-sso-with-okta.md | 9 +- 3 files changed, 8 insertions(+), 138 deletions(-) diff --git a/docs/docs-content/clusters/cluster-management/palette-webctl.md b/docs/docs-content/clusters/cluster-management/palette-webctl.md index 11a843ac6d..d066730db4 100644 --- a/docs/docs-content/clusters/cluster-management/palette-webctl.md +++ b/docs/docs-content/clusters/cluster-management/palette-webctl.md @@ -68,131 +68,3 @@ You can now issue kubectl commands against your host cluster. ### Validate Verify you have access to your host cluster by issuing kubectl commands against it. - - diff --git a/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md b/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md index 31c7397b32..940d30dec9 100644 --- a/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md +++ b/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md @@ -93,11 +93,10 @@ standard that Palette employs. You can only use the OIDC-based approach for Micr 9. These two redirect URIs are required for SSO to work with Palette. You can also add additional redirect URIs. The URIs in the table below are useful when you want to use AD FS for OIDC authentication into your Kubernetes clusters. - | URL | Type of Access | - | ---------------------------------------------------------- | ----------------------------------------------------------- | - | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation | - | `https://console.spectrocloud.com/v1/shelly/oidc/callback` | Using the web-based kubectl console | - | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard | + | URL | Type of Access | + | ------------------------------------------------ | ----------------------------------------------------------- | + | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation | + | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard | 10. When you have completed entering redirect URIs, click **Next**. On the next page of the wizard, select **Generate a shared secret** and click **Copy to clipboard** to copy the secret value and save it somewhere. You will need to diff --git a/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md b/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md index b13cadbab7..17df607a5f 100644 --- a/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md +++ b/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md @@ -85,11 +85,10 @@ The following steps will guide you on how to enable Palette SSO with 8. These two redirect URIs are required for SSO to work with Palette. You can also add additional redirect URIs. The URIs in the table below are useful when you want to use Okta for OIDC authentication into your Kubernetes clusters. - | URL | Type of Access | - | ---------------------------------------------------------- | ------------------------------------------------------------ | - | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation. | - | `https://console.spectrocloud.com/v1/shelly/oidc/callback` | Using the web-based kubectl console. | - | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard. | + | URL | Type of Access | + | ------------------------------------------------ | ------------------------------------------------------------ | + | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation. | + | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard. | 9. When you have completed entering redirect URIs, scroll down to the **Assignments** section and section and select **Allow everyone in your organization to access**. Leave the **Enable immediate access with Federation Broker Mode**