From dc944945a3abd69f45ca093620250c762190d176 Mon Sep 17 00:00:00 2001 From: Van Ngo Date: Mon, 4 Nov 2024 15:36:08 -0500 Subject: [PATCH] Resolve rebase issues --- .../main/azure/appidpinokta.md | 15 --------------- .../main/entra/appidpinokta.md | 6 +++--- 2 files changed, 3 insertions(+), 18 deletions(-) delete mode 100644 packages/@okta/vuepress-site/docs/guides/add-an-external-idp/main/azure/appidpinokta.md diff --git a/packages/@okta/vuepress-site/docs/guides/add-an-external-idp/main/azure/appidpinokta.md b/packages/@okta/vuepress-site/docs/guides/add-an-external-idp/main/azure/appidpinokta.md deleted file mode 100644 index 5fd1dc45c90..00000000000 --- a/packages/@okta/vuepress-site/docs/guides/add-an-external-idp/main/azure/appidpinokta.md +++ /dev/null @@ -1,15 +0,0 @@ -* **Name**: Enter a name for the IdP configuration. -* **Client Id**: Paste the client ID that you obtained from Azure AD when you configured the IdP in the previous section. -* **Client Secret**: Paste the secret that you obtained in the previous section. -* **Scopes**: Leave the defaults. These scopes are included when Okta makes an OpenID Connect request to Azure AD. - - > **Note:** By default, Okta requires the `email` attribute for a user. The `email` scope is required to create and link the user to Okta's Universal Directory. - -In the **Endpoints** section: - -Add the following endpoint URLs for the Azure AD IdP that you’re configuring. You obtained these in the previous section. - -* **Issuer**: The identifier of the Azure AD IdP: `https://login.microsoftonline.com/{Directory(tenant)ID}/v2.0` -* **Authorization endpoint**: The URL of the Azure AD OAuth 2.0 authorization endpoint. For example: `https://login.microsoftonline.com/{Directory(tenant)ID}/oauth2/v2.0/authorize` -* **Token endpoint**: The URL of the Azure AD token endpoint for obtaining access and ID tokens. For example: `https://login.microsoftonline.com/{Directory(tenant)ID}/oauth2/v2.0/token` -* **JWKS endpoint**: The URL of the Azure AD JSON Web Key Set document. This document contains signing keys that are used to validate the signatures from the provider. For example: `https://login.microsoftonline.com/{Directory(tenant)ID}/discovery/v2.0/keys` diff --git a/packages/@okta/vuepress-site/docs/guides/add-an-external-idp/main/entra/appidpinokta.md b/packages/@okta/vuepress-site/docs/guides/add-an-external-idp/main/entra/appidpinokta.md index e4104017ae9..59bbed7bd48 100644 --- a/packages/@okta/vuepress-site/docs/guides/add-an-external-idp/main/entra/appidpinokta.md +++ b/packages/@okta/vuepress-site/docs/guides/add-an-external-idp/main/entra/appidpinokta.md @@ -1,5 +1,5 @@ -* **Name**: Enter a name for the Identity Provider configuration. -* **Client Id**: Paste the client ID that you obtained from Microsoft Entra ID when you configured the Identity Provider in the previous section. +* **Name**: Enter a name for the IdP configuration. +* **Client Id**: Paste the client ID that you obtained from Microsoft Entra ID when you configured the IdP in the previous section. * **Client Secret**: Paste the secret that you obtained in the previous section. * **Scopes**: Leave the defaults. These scopes are included when Okta makes an OpenID Connect request to Microsoft Entra ID. @@ -14,4 +14,4 @@ Add the following endpoint URLs for the Microsoft Entra ID IdP that you're confi * **Token endpoint**: The URL of the Microsoft Entra ID token endpoint for obtaining access and ID tokens. For example: `https://login.microsoftonline.com/{Directory(tenant)ID}/oauth2/v2.0/token` * **JWKS endpoint**: The URL of the Microsoft Entra ID JSON Web Key Set document. This document contains signing keys that are used to validate the signatures from the provider. For example: `https://login.microsoftonline.com/{Directory(tenant)ID}/discovery/v2.0/keys` - > **Note:** These URL values are obtained from the previous [Create an app at the Identity Provider](#create-an-app-at-the-identity-provider) section. \ No newline at end of file + > **Note:** These URL values are obtained from the previous [Create an app at the Identity Provider](#create-an-app-at-the-identity-provider) section.