Skip to content

Commit 2596815

Browse files
Roeegg2letzya
andauthoredJul 15, 2024··
[DX-1437] organise --> organize (PR 2) (#5077)
* organise 2 * organise fix 1 * Update tyk-docs/content/basic-config-and-security/security/dashboard/organisations.md --------- Co-authored-by: Yaara <yaara@tyk.io>
1 parent c7ed6cd commit 2596815

File tree

45 files changed

+122
-122
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+122
-122
lines changed
 

‎tyk-docs/content/advanced-configuration/integrate/3rd-party-identity-providers/dashboard-login-ldap-tib.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ TIB ships with a default `profiles.json` file which contains many example config
127127
The key attributes for LDAP profile are:
128128

129129
* `ID`: The ID by which we will activate the profile by calling the appropriate TIB endpoint
130-
* `OrgId`: The organisation id which the profile is connected to - make sure this is the correct id for your organisation (see the [Dashboard Admin API documentation]({{< ref "dashboard-admin-api/organisations" >}}) for details on how to retrieve this)
130+
* `OrgId`: The organization id which the profile is connected to - make sure this is the correct id for your organization (see the [Dashboard Admin API documentation]({{< ref "dashboard-admin-api/organisations" >}}) for details on how to retrieve this)
131131
* `IdentityHandlerConfig.DashboardCredential`: The Dashboard API Access credential which is used as authorization header
132132
* `ProviderConfig.FailureRedirect`: The URL which TIB will redirect to if the authentication fails
133133
* `ProviderConfig.LDAPPort`: The port through which TIB can communicate with your LDAP server

‎tyk-docs/content/advanced-configuration/integrate/sso.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ weight: 0
1313
### SSO - The generic use case
1414

1515
SSO gives users the ability to log in to multiple applications without the need to enter their password more than once.
16-
[OIDC]({{< ref "basic-config-and-security/security/authentication-authorization/openid-connect" >}}) or SAML enables an application to verify the identity of users from an organisation without the need to self store and manage them, and without doing the identification process and exposing their passwords to that application. Their lists of users and passwords are kept safe in one single place, in the IDP that the organisation has chosen to use. The Authorization server of the IdP identify the users for a pre-registered and approved application (`client` in OAuth and OIDC terminology).
16+
[OIDC]({{< ref "basic-config-and-security/security/authentication-authorization/openid-connect" >}}) or SAML enables an application to verify the identity of users from an organization without the need to self store and manage them, and without doing the identification process and exposing their passwords to that application. Their lists of users and passwords are kept safe in one single place, in the IDP that the organization has chosen to use. The Authorization server of the IdP identify the users for a pre-registered and approved application (`client` in OAuth and OIDC terminology).
1717

1818
### SSO in Tyk
1919

@@ -67,7 +67,7 @@ The provider config for SAML has the following values that can be configured in
6767

6868
`FailureRedirect` - Where to redirect failed login requests.
6969

70-
`IDPMetaDataURL` - The metadata URL of your IDP which will provide Tyk Identity Broker with information about the IDP such as EntityID, Endpoints (Single Sign On Service Endpoint, Single Logout Service Endpoint), its public X.509 cert, NameId Format, Organisation info and Contact info.
70+
`IDPMetaDataURL` - The metadata URL of your IDP which will provide Tyk Identity Broker with information about the IDP such as EntityID, Endpoints (Single Sign On Service Endpoint, Single Logout Service Endpoint), its public X.509 cert, NameId Format, Organization info and Contact info.
7171

7272
This metadata XML can be signed providing a public X.509 cert and the private key.
7373

0 commit comments

Comments
 (0)
Please sign in to comment.