You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`beforeYouStart`| { title: string; link: string; icon: [string](<https://github.com/clerk/clerk/blob/main/src/app/(website)/docs/icons.tsx>) }[]| Links to things that learners should complete before the tutorial. |
678
-
|`exampleRepo` (optional) | { title: string; link: string }[]| Links to example repositories. |
679
-
|`exampleRepoTitle` (optional) | string | The title for the example repository/repositories. Defaults to `'Example repository'`. |
|`beforeYouStart`| { title: string; link: string; icon: [string](<https://github.com/clerk/clerk/blob/main/src/app/(website)/docs/icons.tsx>) }[]| Links to things that learners should complete before the tutorial. |
678
+
|`exampleRepo` (optional) | { title: string; link: string }[]| Links to example repositories. |
679
+
|`exampleRepoTitle` (optional) | string | The title for the example repository/repositories. Defaults to `'Example repository'` or `'Example repositories'`, but can be passed any string. |
680
680
681
681
```mdx
682
682
<TutorialHero
@@ -690,23 +690,15 @@ The `<TutorialHero />` component is used at the beginning of a tutorial-type con
Copy file name to clipboardExpand all lines: docs/authentication/enterprise-connections/easie/google.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -21,9 +21,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
21
21
icon: "user-circle",
22
22
}
23
23
]}
24
-
>
25
-
- Use Google to authenticate users with EASIE SSO.
26
-
</TutorialHero>
24
+
/>
27
25
28
26
Enabling [EASIE SSO](/docs/authentication/enterprise-connections/overview#easie) with Google allows your users to sign up and sign in to your Clerk application with their Google account.
- Use Microsoft to authenticate users with EASIE SSO.
26
-
</TutorialHero>
24
+
/>
27
25
28
26
Enabling [EASIE SSO](/docs/authentication/enterprise-connections/overview#easie) with Microsoft (formerly [Active Directory](https://learn.microsoft.com/en-us/entra/fundamentals/new-name)) allows your users to sign up and sign in to your Clerk application with their Microsoft account.
Copy file name to clipboardExpand all lines: docs/authentication/enterprise-connections/oidc/custom-provider.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to integrate a custom OIDC provider with Clerk for Enterp
16
16
icon: "key",
17
17
},
18
18
]}
19
-
>
20
-
- Add a custom OIDC provider to authenticate users with Enterprise SSO
21
-
</TutorialHero>
19
+
/>
22
20
23
21
This guide explains how to use a custom [OpenID Connect (OIDC)](https://openid.net/developers/how-connect-works) provider to authenticate users via Enterprise SSO.
Copy file name to clipboardExpand all lines: docs/authentication/enterprise-connections/saml/azure.mdx
+2-8
Original file line number
Diff line number
Diff line change
@@ -16,15 +16,9 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "key",
17
17
}
18
18
]}
19
-
>
20
-
- Create a SSO connection via Clerk Dashboard
21
-
- Give your customer instructions on how to connect Microsoft Entra ID to your app
22
-
- Enable and test the SAML connection
23
-
</TutorialHero>
19
+
/>
24
20
25
-
Enabling SAML with Microsoft Entra ID (formerly [Azure Active Directory](https://learn.microsoft.com/en-us/entra/fundamentals/new-name)) allows your users to sign up and sign in to your Clerk application with their Microsoft account.
26
-
27
-
This process requires configuration changes in both the Clerk Dashboard, and in your customer's Microsoft Entra ID settings in their Azure account.
21
+
Enabling SAML with Microsoft Entra ID (formerly [Azure Active Directory](https://learn.microsoft.com/en-us/entra/fundamentals/new-name)) allows your users to sign up and sign in to your Clerk application with their Microsoft account. It requires that a SAML connection is configured in both the Clerk Dashboard and Microsoft Entra ID. This guide assumes that you have access to the Clerk app's settings in the Clerk Dashboard. The "customer" in this case is whoever has access to the Microsoft Entra ID settings.
28
22
29
23
<Steps>
30
24
## Create a Microsoft Entra ID SAML connection in Clerk
Copy file name to clipboardExpand all lines: docs/authentication/enterprise-connections/saml/custom-provider.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to integrate an Identity Provider (IdP) with Clerk using
16
16
icon: "key",
17
17
}
18
18
]}
19
-
>
20
-
- Use a custom IdP to enable single sign-on (SSO) via SAML for your Clerk application.
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Clerk supports Enterprise SSO via the SAML protocol, enabling you to create authentication strategies for an Identity Provider (IdP). Currently, Clerk offers direct integrations with the following IdPs: [Microsoft Azure AD](/docs/authentication/enterprise-connections/saml/azure), [Google Workspace](/docs/authentication/enterprise-connections/saml/google), and [Okta Workforce](/docs/authentication/enterprise-connections/saml/okta). However, you can also integrate with any other IdPs that supports the SAML protocol.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/apple.mdx
+2-4
Original file line number
Diff line number
Diff line change
@@ -16,13 +16,11 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
}
18
18
]}
19
-
>
20
-
- Use [Sign in with Apple](https://developer.apple.com/sign-in-with-apple/) to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth via [Sign in with Apple](https://developer.apple.com/sign-in-with-apple/) allows your users to sign in and sign up to your Clerk app with their Apple ID.
24
22
25
-
> [!NOTE]
23
+
> [!IMPORTANT]
26
24
> This guide explains how to configure Sign in with Apple for web based flows. To configure native Sign in with Apple on native applications (iOS), see the [dedicated guide](/docs/references/ios/sign-in-with-apple).
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/bitbucket.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
}
18
18
]}
19
-
>
20
-
- Use Bitbucket to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [Bitbucket](https://developer.atlassian.com/cloud/bitbucket/oauth-2) allows your users to sign up and sign in to your Clerk application with their Bitbucket account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/coinbase.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
},
18
18
]}
19
-
>
20
-
- Use Coinbase to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [Coinbase](https://docs.cdp.coinbase.com/coinbase-app/docs/coinbase-app) allows your users to sign up and sign in to your Clerk app with their Coinbase account.
- Configure custom Auth provider for your Clerk application.
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Clerk allows you to configure custom OpenID Connect (OIDC) compatible authentication providers for your application. This guide walks you through the steps to set up a custom OAuth provider.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/discord.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
}
18
18
]}
19
-
>
20
-
- Use Discord to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [Discord](https://discord.com/developers/docs/topics/oauth2) allows your users to sign up and sign in to your Clerk application with their Discord account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/github.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -17,9 +17,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
17
17
icon: "user-circle",
18
18
},
19
19
]}
20
-
>
21
-
- Use GitHub to authenticate users with OAuth
22
-
</TutorialHero>
20
+
/>
23
21
24
22
Enabling OAuth with [GitHub](https://docs.github.com/en/developers/apps/building-oauth-apps/creating-an-oauth-app) allows your users to sign up and sign in to your Clerk app with their GitHub account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/gitlab.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
},
18
18
]}
19
-
>
20
-
- Use GitLab to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [GitLab](https://docs.gitlab.com/ee/integration/oauth_provider.html) allows your users to sign up and sign in to your Clerk app with their GitLab account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/google.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
}
18
18
]}
19
-
>
20
-
- Use Google to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [Google](https://developers.google.com/identity/protocols/oauth2) allows your users to sign up and sign in to your Clerk application with their Google account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/huggingface.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
}
18
18
]}
19
-
>
20
-
- Use Hugging Face to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [Hugging Face](https://huggingface.co/) allows your users to sign up and sign in to your Clerk application with their Hugging Face account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/linear.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
},
18
18
]}
19
-
>
20
-
- Use Linear to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [Linear](https://developers.linear.app/docs/oauth/authentication) allows your users to sign up and sign in to your Clerk app with their Linear account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/linkedin-oidc.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
}
18
18
]}
19
-
>
20
-
- Use LinkedIn OIDC to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OpenID Connect (OIDC) with [LinkedIn](https://learn.microsoft.com/en-us/linkedin/shared/authentication/authentication) allows your users to sign up and sign in to your Clerk application with their LinkedIn account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/microsoft.mdx
+1-4
Original file line number
Diff line number
Diff line change
@@ -16,10 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
}
18
18
]}
19
-
>
20
-
- Use Microsoft Azure Entra ID to authenticate users with OAuth
21
-
- Protect your app from [the nOAuth exploit](https://www.descope.com/blog/post/noauth)
22
-
</TutorialHero>
19
+
/>
23
20
24
21
Enabling OAuth with Microsoft Azure Entra ID (formerly [Active Directory](https://learn.microsoft.com/en-us/entra/fundamentals/new-name)) allows your users to sign up and sign in to your Clerk app with their Microsoft account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/spotify.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
},
18
18
]}
19
-
>
20
-
- Use Spotify to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [Spotify](https://developer.spotify.com/documentation/web-api/concepts/authorization) allows your users to sign up and sign in to your Clerk application with their Spotify account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/tiktok.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
}
18
18
]}
19
-
>
20
-
- Use TikTok ID to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [TikTok](https://developers.tiktok.com/doc/login-kit-manage-user-access-tokens) allows your users to sign up and sign in to your Clerk app with their TikTok account.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/twitch.mdx
+1-3
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ description: Learn how to allow users to sign up and sign in to your Clerk app w
16
16
icon: "user-circle",
17
17
}
18
18
]}
19
-
>
20
-
- Use Twitch to authenticate users with OAuth
21
-
</TutorialHero>
19
+
/>
22
20
23
21
Enabling OAuth with [Twitch](https://dev.twitch.tv/docs/api/reference#oauth-client-credentials-flow) allows your users to sign up and sign in to your Clerk application with their Twitch account.
0 commit comments