website/integrations: add OneUptime SAML integration guide#21534
website/integrations: add OneUptime SAML integration guide#21534M-Slanec wants to merge 4 commits intogoauthentik:mainfrom
Conversation
✅ Deploy Preview for authentik-integrations ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
✅ Deploy Preview for authentik-docs ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #21534 +/- ##
==========================================
- Coverage 92.21% 92.20% -0.01%
==========================================
Files 1032 1032
Lines 59660 59660
Branches 2537 2537
==========================================
- Hits 55015 55012 -3
- Misses 4580 4583 +3
Partials 65 65
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
|
Seems like you had an issue with the commit because it's just an empty file. |
✅ Deploy Preview for authentik-storybook ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
6fc6ece to
77a64d1
Compare
PeshekDotDev
left a comment
There was a problem hiding this comment.
We should be able to explain the slug and then set those values in oneuptime at the first time we configure. It cleans up some of the process a bit. I'm pretty sure we do something similar in some other integration guides
| 3. Click **Create SSO** and configure the following settings: | ||
| - **Name**: enter a descriptive name, such as `authentik`. | ||
| - **Sign On URL**: temporarily set to `https://placeholder.invalid/sso`. | ||
| - **Issuer**: temporarily set to `https://placeholder.invalid/issuer`. |
There was a problem hiding this comment.
Let's set this as the https://authentik.company/application/saml/<application_slug>/metadata/ like below
| 2. Navigate to **Project Settings** > **Authentication** > **SSO**. | ||
| 3. Click **Create SSO** and configure the following settings: | ||
| - **Name**: enter a descriptive name, such as `authentik`. | ||
| - **Sign On URL**: temporarily set to `https://placeholder.invalid/sso`. |
There was a problem hiding this comment.
Let's just set this as the https://authentik.company/application/saml/<application_slug>/sso/binding/redirect/ that we know it will have to be. Then we can remove lines 78-87. I'm pretty sure we have some setups for something like this in the docs that we should be able to follow
Details
This adds an integration guide for logging into OneUptime with SAML.
closes #21533
Checklist
ak test authentik/)make lint-fix)If an API change has been made
make gen)If changes to the frontend have been made
make web)If applicable
make docs)