You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CONTRIBUTING.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -839,7 +839,7 @@ The `<Include />` component can be used to inject the contents of another MDX fi
839
839
840
840
### `<If />`
841
841
842
-
The `<If />` component is used for conditional rendering. When the conditions are true, it displays its contents. When the conditions are false, it hides its contents. We commonly use this component to conditionally render content based on the **active SDK**. The **active SDK** is the SDK that is selected in the sidebar.
842
+
The `<If />` component is used for conditional rendering. When the conditions are true, it displays its contents. When the conditions are false, it hides its contents. We commonly use this component to conditionally render content based on the **active SDK**. The **active SDK** is the SDK that is selected in the sidenav.
843
843
844
844
> [!IMPORTANT]
845
845
> This component cannot be used within code blocks.
Copy file name to clipboardExpand all lines: docs/_partials/authentication/microsoft/create-app.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
> If you already have a Microsoft Entra ID app you'd like to connect to Clerk, select your app from the [Microsoft Azure portal](https://portal.azure.com/#home) and skip to [the next step in this tutorial](#get-your-client-id-and-client-secret).
3
3
4
4
1. On the homepage of the [Microsoft Azure portal](https://portal.azure.com/#home), in the **Azure services** section, select **[Microsoft Entra ID](https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/Overview)**.
5
-
1. In the sidebar, open the **Manage** dropdown and select **[App registrations](https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/RegisteredApps)**.
5
+
1. In the sidenav, open the **Manage** dropdown and select **[App registrations](https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/RegisteredApps)**.
6
6
1. Select **New Registration**. You'll be redirected to the **Register an application** page.
Copy file name to clipboardExpand all lines: docs/_partials/authentication/microsoft/noauth.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,15 +4,15 @@ For further security, Microsoft offers an optional `xms_edov` [claim](https://le
4
4
5
5
To enable it, you must:
6
6
7
-
1. In the left sidebar, in the **Manage** dropdown, select **Token configuration**.
7
+
1. In the left sidenav, in the **Manage** dropdown, select **Token configuration**.
8
8
1. Select **Add optional claim**.
9
9
1. For the **Token type**, select **ID**. Then, in the table that opens, enable the `email` and `xms_pdl` claims.
10
10
1. At the bottom of the modal, select **Add**. A new modal will prompt you to turn on the Microsoft Graph email permission. Enable it, then select **Add** to complete the form.
11
11
1. Repeat the previous steps but for **Token type**, select **Access** instead of **ID**. The **Optional claims** list should now show two claims for `email` and two for `xms_pdl`: one each for **ID** and **Access**.
12
-
1. In the left sidebar, in the **Manage** dropdown, select **Manifest**.
12
+
1. In the left sidenav, in the **Manage** dropdown, select **Manifest**.
13
13
1. In the text editor, search for `"acceptMappedClaims"` and set its value from `null` to `true`.
14
14
1. Search for `"optionalClaims"`, where you'll find the `idToken` and `accessToken` arrays. Each array has an object with the name `xms_pdl`. Change the name to `xms_edov`.
15
15
1. At the top of the page, select **Save**.
16
-
1. In the left sidebar, in the **Manage** dropdown, select **Token configuration** to confirm that the **Optional claims** list includes two claims for `email` and two for `xms_edov`: one each for **ID** and **Access**.
16
+
1. In the left sidenav, in the **Manage** dropdown, select **Token configuration** to confirm that the **Optional claims** list includes two claims for `email` and two for `xms_edov`: one each for **ID** and **Access**.
17
17
18
18
With these steps complete, Microsoft will send the `xms_edov` claim in the token, which Clerk will use to determine whether the email is verified, even when used with Microsoft Entra ID.
Copy file name to clipboardExpand all lines: docs/authentication/enterprise-connections/easie/google.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ To make the setup process easier, it's recommended to keep two browser tabs open
60
60
1. Navigate to the [Google Cloud Console](https://console.cloud.google.com/).
61
61
1. Select a project or [create a new one](https://console.cloud.google.com/projectcreate).
62
62
1. If the **APIs & Services** page isn't already open, open the menu on the left and select **APIs & Services**.
63
-
1. In the left sidebar, select **Credentials**.
63
+
1. In the left sidenav, select **Credentials**.
64
64
1. Select **Create Credentials**. Then, select **OAuth client ID.** You may need to [configure your OAuth consent screen](https://support.google.com/cloud/answer/6158849?hl=en#userconsent\&zippy=%2Cuser-consent).
65
65
1. Select the appropriate application type for your project. Most likely, you will choose **Web application**.
66
66
1. In the **Authorized redirect URIs** section, select **Add URI** and paste the **Redirect URI** value you saved from the Clerk Dashboard.
Copy file name to clipboardExpand all lines: docs/authentication/social-connections/apple.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ To make the setup process easier, it's recommended to keep two browser tabs open
96
96
97
97
To get your **Apple Private Key** and **Key ID**, create a new **Key** in the Apple Developer portal.
98
98
99
-
1. On the **Identifiers** page, in the sidebar, select **Keys**.
99
+
1. On the **Identifiers** page, in the sidenav, select **Keys**.
100
100
1. Next to **Keys** at the top of the page, select the plus icon (+) to register a new key. You'll be redirected to the **Register a New Key** page.
101
101
1. Add a **Key Name** and ensure the **Sign In with Apple** box is enabled and select **Configure**. You'll be redirected to the **Configure Key** page.
102
102
1. Under **Primary App ID**, select the **App ID** you created in the first step of this guide. Then select **Save**. You'll be redirected to the previous **Register a New Key** page.
@@ -113,7 +113,7 @@ To make the setup process easier, it's recommended to keep two browser tabs open
113
113
114
114
To be able to send emails properly to users with hidden addresses, you must configure an additional setting in the Apple Developer portal.
115
115
116
-
1. In the sidebar, select **Services**.
116
+
1. In the sidenav, select **Services**.
117
117
1. Under **Sign in with Apple for Email Communication**, select **Configure**. You'll be redirected to the **Configure Sign in with Apple for Email Communication** page.
118
118
1. Next to **Email Sources** at the top of the page, select the plus icon (+) to add a new **Email Source**.
119
119
1. In the **Register your email sources** modal that opens, under **Email Addresses**, add the **Email Source for Apple Private Email Relay** value that you saved from the Clerk Dashboard. It should look something like this: `[email protected]`.
0 commit comments