From 9f46f012c75c98a4f4a57ceacea08066ce3c459a Mon Sep 17 00:00:00 2001 From: "vault-token-factory-spectrocloud[bot]" <133815545+vault-token-factory-spectrocloud[bot]@users.noreply.github.com> Date: Mon, 13 Jan 2025 15:37:28 +0000 Subject: [PATCH] docs: DOC-1588 (#5395) (#5404) (cherry picked from commit 8395c6822f9649e78d680384cee088d247ce578f) Co-authored-by: Karl Cardenas <29551334+karl-cardenas-coding@users.noreply.github.com> --- .../cluster-management/palette-webctl.md | 128 ------------------ .../saml-sso/palette-sso-with-adfs.md | 9 +- .../saml-sso/palette-sso-with-okta.md | 9 +- 3 files changed, 8 insertions(+), 138 deletions(-) diff --git a/docs/docs-content/clusters/cluster-management/palette-webctl.md b/docs/docs-content/clusters/cluster-management/palette-webctl.md index 11a843ac6d..d066730db4 100644 --- a/docs/docs-content/clusters/cluster-management/palette-webctl.md +++ b/docs/docs-content/clusters/cluster-management/palette-webctl.md @@ -68,131 +68,3 @@ You can now issue kubectl commands against your host cluster. ### Validate Verify you have access to your host cluster by issuing kubectl commands against it. - - diff --git a/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md b/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md index 0570aa891f..45c1c07956 100644 --- a/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md +++ b/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md @@ -81,11 +81,10 @@ standard that Palette employs. You can only use the OIDC-based approach for Micr 9. These two redirect URIs are required for SSO to work with Palette. You can also add additional redirect URIs. The URIs in the table below are useful when you want to use AD FS for OIDC authentication into your Kubernetes clusters. - | URL | Type of Access | - | ---------------------------------------------------------- | ----------------------------------------------------------- | - | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation | - | `https://console.spectrocloud.com/v1/shelly/oidc/callback` | Using the web-based kubectl console | - | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard | + | URL | Type of Access | + | ------------------------------------------------ | ----------------------------------------------------------- | + | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation | + | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard | 10. When you have completed entering redirect URIs, click **Next**. On the next page of the wizard, select **Generate a shared secret** and click **Copy to clipboard** to copy the secret value and save it somewhere. You will need to diff --git a/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md b/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md index 566b4a1fce..342b8df3fa 100644 --- a/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md +++ b/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md @@ -72,11 +72,10 @@ The following steps will guide you on how to enable Palette SSO with 8. These two redirect URIs are required for SSO to work with Palette. You can also add additional redirect URIs. The URIs in the table below are useful when you want to use Okta for OIDC authentication into your Kubernetes clusters. - | URL | Type of Access | - | ---------------------------------------------------------- | ------------------------------------------------------------ | - | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation. | - | `https://console.spectrocloud.com/v1/shelly/oidc/callback` | Using the web-based kubectl console. | - | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard. | + | URL | Type of Access | + | ------------------------------------------------ | ------------------------------------------------------------ | + | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation. | + | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard. | 9. When you have completed entering redirect URIs, scroll down to the **Assignments** section and section and select **Allow everyone in your organization to access**. Leave the **Enable immediate access with Federation Broker Mode**