diff --git a/docs/docs-content/clusters/cluster-management/palette-webctl.md b/docs/docs-content/clusters/cluster-management/palette-webctl.md index 293c814b92..d066730db4 100644 --- a/docs/docs-content/clusters/cluster-management/palette-webctl.md +++ b/docs/docs-content/clusters/cluster-management/palette-webctl.md @@ -68,137 +68,3 @@ You can now issue kubectl commands against your host cluster. ### Validate Verify you have access to your host cluster by issuing kubectl commands against it. - - diff --git a/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md b/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md index aa0403b6f7..1a6d93a714 100644 --- a/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md +++ b/docs/docs-content/user-management/saml-sso/palette-sso-with-adfs.md @@ -83,11 +83,10 @@ standard that Palette employs. You can only use the OIDC-based approach for Micr 9. These two redirect URIs are required for SSO to work with Palette. You can also add additional redirect URIs. The URIs in the table below are useful when you want to use AD FS for OIDC authentication into your Kubernetes clusters. - | URL | Type of Access | - | ---------------------------------------------------------- | ----------------------------------------------------------- | - | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation | - | `https://console.spectrocloud.com/v1/shelly/oidc/callback` | Using the web-based kubectl console | - | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard | + | URL | Type of Access | + | ------------------------------------------------ | ----------------------------------------------------------- | + | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation | + | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard | 10. When you have completed entering redirect URIs, click **Next**. On the next page of the wizard, select **Generate a shared secret** and click **Copy to clipboard** to copy the secret value and save it somewhere. You will need to diff --git a/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md b/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md index 552165760e..78d720af92 100644 --- a/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md +++ b/docs/docs-content/user-management/saml-sso/palette-sso-with-okta.md @@ -74,11 +74,10 @@ The following steps will guide you on how to enable Palette SSO with 8. These two redirect URIs are required for SSO to work with Palette. You can also add additional redirect URIs. The URIs in the table below are useful when you want to use Okta for OIDC authentication into your Kubernetes clusters. - | URL | Type of Access | - | ---------------------------------------------------------- | ------------------------------------------------------------ | - | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation. | - | `https://console.spectrocloud.com/v1/shelly/oidc/callback` | Using the web-based kubectl console. | - | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard. | + | URL | Type of Access | + | ------------------------------------------------ | ------------------------------------------------------------ | + | `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation. | + | `https:///oauth/callback` | Using OIDC authentication into Kubernetes Dashboard. | 9. When you have completed entering redirect URIs, scroll down to the **Assignments** section and section and select **Allow everyone in your organization to access**. Leave the **Enable immediate access with Federation Broker Mode**