diff --git a/website/docs/advanced/code-references/bitbucket-pipe.mdx b/website/docs/advanced/code-references/bitbucket-pipe.mdx
index b5d380ab..228980aa 100644
--- a/website/docs/advanced/code-references/bitbucket-pipe.mdx
+++ b/website/docs/advanced/code-references/bitbucket-pipe.mdx
@@ -10,7 +10,7 @@ You can find more information about Bitbucket Pipelines ConfigCat Management API credential and store its values in secure pipeline variables with the following names: `CONFIGCAT_API_USER`, `CONFIGCAT_API_PASS`.
-
+
2. Get your selected [Config's ID](overview.mdx#config-id).
diff --git a/website/docs/advanced/code-references/bitrise-step.mdx b/website/docs/advanced/code-references/bitrise-step.mdx
index a78685d1..b79bb990 100644
--- a/website/docs/advanced/code-references/bitrise-step.mdx
+++ b/website/docs/advanced/code-references/bitrise-step.mdx
@@ -10,7 +10,7 @@ to automatically scan your source code for feature flag and setting usages and u
## Setup
1. Create a new ConfigCat Management API credential and store its values in secure pipeline variables with the following names: `CONFIGCAT_API_USER`, `CONFIGCAT_API_PASS`.
-
+
2. Get your selected [Config's ID](overview.mdx#config-id).
diff --git a/website/docs/advanced/code-references/circleci-orb.mdx b/website/docs/advanced/code-references/circleci-orb.mdx
index 3acd041a..bec284a3 100644
--- a/website/docs/advanced/code-references/circleci-orb.mdx
+++ b/website/docs/advanced/code-references/circleci-orb.mdx
@@ -10,7 +10,7 @@ You can find more information about CircleCI Orbs ConfigCat Management API credential and store its values in CircleCI Environment Variables with the following names: `CONFIGCAT_API_USER`, `CONFIGCAT_API_PASS`.
-
+
2. Get your selected [Config's ID](overview.mdx#config-id).
diff --git a/website/docs/advanced/team-management/auto-assign-users.mdx b/website/docs/advanced/team-management/auto-assign-users.mdx
index 7a801936..974e94b5 100644
--- a/website/docs/advanced/team-management/auto-assign-users.mdx
+++ b/website/docs/advanced/team-management/auto-assign-users.mdx
@@ -11,14 +11,14 @@ Furthermore, you can also set which Organization roles / Product permissions the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Select the domain you want to configure, and click `RE-CONFIGURE` (or just `CONFIGURE` if you haven’t configured it yet) under the `Auto-assign status`.
-
+
- In the dialog that appears, you can select which `Organization roles` and `Product permissions` should be assigned to the newly registered users.
-
+
- When you are ready, just hit `Save`.
diff --git a/website/docs/advanced/team-management/domain-verification.mdx b/website/docs/advanced/team-management/domain-verification.mdx
index 214bded3..928fbe82 100644
--- a/website/docs/advanced/team-management/domain-verification.mdx
+++ b/website/docs/advanced/team-management/domain-verification.mdx
@@ -10,16 +10,16 @@ In order to use the [SAML Single Sign-On](../../advanced/team-management/saml/ov
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD & VERIFY DOMAIN`.
-
+
- Type your domain name, then click `ADD`
-
+
- Follow the instructions on the appearing dialog to verify your domain.
-
+
diff --git a/website/docs/advanced/team-management/saml/identity-providers/adfs.mdx b/website/docs/advanced/team-management/saml/identity-providers/adfs.mdx
index b3c0c7ba..2b39cfc6 100644
--- a/website/docs/advanced/team-management/saml/identity-providers/adfs.mdx
+++ b/website/docs/advanced/team-management/saml/identity-providers/adfs.mdx
@@ -17,77 +17,77 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and save them for further use.
- `Entity ID`
- `Assertion Consumer Service`
-
+
## 2. Configure a Relying Party Trust
- Open the ADFS Management console, and click `Add Relying Party Trust`.
-
+
- Make sure the `Claims aware` option is selected, and click `Start`.
-
+
- Select the `Enter data about this relying party manually` option, and click `Next`.
-
+
- Type a descriptive `Display name`, and click `Next`.
-
+
- No action required on the `Configure Certificate` pane, click `Next`.
-
+
- Select the `Enable support for the SAML 2.0 WebSSO protocol` option, and paste the value of `Assertion Consumer Service` from [Step 1](#1-collect-saml-metadata-from-configcat) into the `Relying party SAML 2.0 SSO service URL` field.
Then, Click `Next`.
-
+
- Paste the value of `Entity ID` from [Step 1](#1-collect-saml-metadata-from-configcat) into the `Relying party trust identifier` field, and click `Add`.
Then, click `Next`.
-
+
- No action required on the `Choose Access Control Policy` pane, click `Next`.
-
+
- Review the changes, then click `Next`.
-
+
- The Relying Party Trust is now successfully added, make sure the `Configure claims issuance policy for this application` option is checked, and click `Close`.
-
+
## 3. Configure Claims Issuance Policy
- After adding the Relying Party Trust, the following dialog should appear.
Click `Add rule`.
-
+
- Select `Send LDAP Attributes as Claims` as the `Claim rule template`, and click `Next`.
-
+
- Apply the following, and click `Finish`.
@@ -96,11 +96,11 @@ Click `Add rule`.
- Select `User-Principal-Name` as `LDAP Attribute`.
- Select `Name ID` as `Outgoing Claim Type`.
-
+
- Click `OK`.
-
+
## 4. Configure ConfigCat with SAML Details from ADFS
@@ -111,15 +111,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select Endpoints
, and copy the URL Path of the Federation Metadata
endpoint.
-
+
-
Type the URL into the Metadata URL
field at ConfigCat in the following format: https://[ADFS-DOMAIN]/[FEDERATION-METADATA-URL-PATH]
.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -130,44 +130,44 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select Endpoints
, and save the URL Path of the SAML 2.0/WS-Federation
endpoint.
-
+
-
Select Certificates
, then select the Token Signing
certificate, and click View Certificate
.
-
+
-
On the Details
tab click Copy to File
.
-
+
-
Click Next
.
-
+
-
Select the Base-64 encoded X.509 (.CER)
option, and click Next
.
-
+
-
Browse the location where the certificate should be exported, and click Next
.
-
+
-
Click Finish
.
-
+
-
Click OK
.
-
+
-
Type the SAML 2.0/WS-Federation
endpoint into the Sign-on URL
field in the following format: https://[ADFS-DOMAIN]/[WS-FEDERATION-URL-PATH]
.
Then, paste the exported Token Signing
certificate into the X.509 Certificate
field.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -180,15 +180,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address.
-
+
- ConfigCat will redirect you to the ADFS sign in page. Type your credentials, and click `Sign in`.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/docs/advanced/team-management/saml/identity-providers/auth0.mdx b/website/docs/advanced/team-management/saml/identity-providers/auth0.mdx
index 1547e4b1..be6f4d7e 100644
--- a/website/docs/advanced/team-management/saml/identity-providers/auth0.mdx
+++ b/website/docs/advanced/team-management/saml/identity-providers/auth0.mdx
@@ -17,15 +17,15 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to Auth0, select `Applications` from the menu, then click `Create Application`.
-
+
- Enter a descriptive `Name`, select `Regular Web Applications`, then click `Create`.
-
+
- Select the `Addons` tab, and click `SAML2`.
-
+
The next step will guide you on how to collect the information required for the appearing configuration dialog.
@@ -33,15 +33,15 @@ The next step will guide you on how to collect the information required for the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the Auth0 configuration dialog.
@@ -59,9 +59,9 @@ The next step will guide you on how to collect the information required for the
}
```
-
+
-
+
- Click on `Save`.
@@ -74,15 +74,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Copy the URL of Identity Provide metadata
.
-
+
-
Paste the copied value into the Metadata URL
field at ConfigCat.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -93,12 +93,12 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Copy the value of Identity Provider Login URL
and download the Identity Provider Certificate
, then paste them into the Configuration dialog at ConfigCat.
-
-
+
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -111,15 +111,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the Auth0 application.
-
+
- ConfigCat will redirect you to Auth0's sign in page. Type your credentials, and click `Continue`.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/docs/advanced/team-management/saml/identity-providers/azure-ad.mdx b/website/docs/advanced/team-management/saml/identity-providers/azure-ad.mdx
index fac30de0..5b84e49e 100644
--- a/website/docs/advanced/team-management/saml/identity-providers/azure-ad.mdx
+++ b/website/docs/advanced/team-management/saml/identity-providers/azure-ad.mdx
@@ -17,23 +17,23 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to the Azure Portal, go to the `Entra ID` resource, and select `Enterprise applications`.
-
+
- Click on `New application`.
-
+
- Click on `Create your own application`.
-
+
- Enter a descriptive `App name`, select the `Integrate any other application you don't find in the gallery (Non-gallery)` option, then click `Create`.
-
+
- On the `Manage` section of the application, select `Single sign-on`, then select `SAML`.
-
+
The next step will guide you on how to collect the information required for Configuring SAML in the application.
@@ -41,26 +41,26 @@ The next step will guide you on how to collect the information required for Conf
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the Enterprise application.
- `Entity ID` -> `Identifier (Entity ID)`
- `Assertion Consumer Service` -> `Reply URL (Assertion Consumer Service URL)`
-
+
-
+
-
+
## 3. Configure ConfigCat with SAML Details from Azure
@@ -71,15 +71,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Copy the value of App Federation Metadata Url
.
-
+
-
Paste the copied value into the Metadata URL
field at ConfigCat.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -90,13 +90,13 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Copy the value of Login URL
and download the Certificate (Base64)
, then paste them into the Configuration dialog at ConfigCat.
-
-
-
+
+
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -111,25 +111,25 @@ To let users authenticate via SAML, you need to assign individual users or group
- Select `Users and groups` on the `Manage` section of the menu.
-
+
- Click `Add user/group`, then select the users or groups you want to assign.
-
+
## 5. Sign In
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the Enterprise application.
-
+
- ConfigCat will redirect you to Microsoft's sign in page. Type your credentials for sign-in.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/docs/advanced/team-management/saml/identity-providers/cloudflare.mdx b/website/docs/advanced/team-management/saml/identity-providers/cloudflare.mdx
index 3c53bacb..be5bfaea 100644
--- a/website/docs/advanced/team-management/saml/identity-providers/cloudflare.mdx
+++ b/website/docs/advanced/team-management/saml/identity-providers/cloudflare.mdx
@@ -15,15 +15,15 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to CloudFlare, go to the Zero Trust Dashboard, and select `Applications` under the `Access` menu.
Then click on `Add an application`.
-
+
- Select `SaaS`.
-
+
- Enter a descriptive name in the `Application` field.
-
+
The next step will guide you on how to collect the information required for the appearing configuration section.
@@ -31,28 +31,28 @@ The next step will guide you on how to collect the information required for the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the Cloudflare application.
- `Entity ID` -> `Entity ID`
- `Assertion Consumer Service` -> `Assertion Consumer Service URL`
-
+
-
+
- Set the `Name ID Format` to `Email`.
-
+
- Click `Next` at the bottom of the page.
@@ -62,7 +62,7 @@ To let users authenticate via SAML, you need to assign groups to the Cloudflare
- Give a name for the Cloudflare Application's policy and check those groups that you want to assign.
-
+
- Click `Next` at the bottom of the page.
@@ -70,20 +70,20 @@ To let users authenticate via SAML, you need to assign groups to the Cloudflare
- Copy the value of `SSO endpoint` and `Public key` fields.
-
+
- On the ConfigCat Dashboard, select the `3. Set up ConfigCat` step, click `Manual Configuration`, then paste the copied values into the appearing fields.
- `SSO endpoint` -> `Sign-on URL`
- `Public key` -> `X.509 Certificate`
-
+
## 5. Select Trusted Domains on the SAML Configuration Dialog
- Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
- Click `Save`.
@@ -91,15 +91,15 @@ To let users authenticate via SAML, you need to assign groups to the Cloudflare
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the Cloudflare application.
-
+
- ConfigCat will redirect you to Cloudflare's sign in page.
-
+
## 6. Next Steps
diff --git a/website/docs/advanced/team-management/saml/identity-providers/google.mdx b/website/docs/advanced/team-management/saml/identity-providers/google.mdx
index 854f6381..8fdd88de 100644
--- a/website/docs/advanced/team-management/saml/identity-providers/google.mdx
+++ b/website/docs/advanced/team-management/saml/identity-providers/google.mdx
@@ -17,15 +17,15 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to Google Admin console, select `Apps` from the side menu, then select `Web and mobile apps`.
-
+
- Click `Add App`, then select `Add custom SAML app`.
-
+
- Enter a descriptive `App name`, then click `CONTINUE`.
-
+
The next step will guide you on how to configure ConfigCat with appearing information.
@@ -33,27 +33,27 @@ The next step will guide you on how to configure ConfigCat with appearing inform
- Copy the value of `SSO URL` and `Certificate` fields and save them for further use.
-
+
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- Select the `3. Set up ConfigCat` step, click `Manual Configuration`, then paste the copied values into the appearing fields.
-
+
- Click `CONTINUE` on the Google App configuration.
-
+
The next step will guide you on how to configure the Google App with details provided by ConfigCat.
@@ -64,24 +64,24 @@ The next step will guide you on how to configure the Google App with details pro
- `Entity ID` -> `Entity ID`
- `Assertion Consumer Service` -> `ACS URL`
-
+
- Make sure the `Signed response` option is checked.
- Select `EMAIL` as `Name ID format`.
- Select `Basic Information > Primary email` as `Name ID`.
- Click `CONTINUE`.
-
+
- Click `FINISH`.
-
+
## 4. Select Trusted Domains on the SAML Configuration Dialog
- Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
- Click `Save`.
@@ -89,25 +89,25 @@ The next step will guide you on how to configure the Google App with details pro
- Click on `View details` under the `User access` section.
-
+
- Select `ON for everyone`, then click `SAVE`.
-
+
## 6. Sign In
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address used in Google.
-
+
- ConfigCat will redirect you to Google's sign in page. Type your credentials, and sign in.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/docs/advanced/team-management/saml/identity-providers/okta.mdx b/website/docs/advanced/team-management/saml/identity-providers/okta.mdx
index 4bff0763..0822d67a 100644
--- a/website/docs/advanced/team-management/saml/identity-providers/okta.mdx
+++ b/website/docs/advanced/team-management/saml/identity-providers/okta.mdx
@@ -17,19 +17,19 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to Okta, go to the admin Dashboard, and select `Applications`.
-
+
- Click on `Create App Integration`.
-
+
- Select `SAML 2.0` as the Sign-in method.
-
+
- Enter a descriptive `App name`, then click `Next`.
-
+
The next step will guide you on how to collect the information required for the appearing `Configure SAML` section.
@@ -37,32 +37,32 @@ The next step will guide you on how to collect the information required for the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the Okta application.
- `Entity ID` -> `Audience URI (SP Entity ID)`
- `Assertion Consumer Service` -> `Single sign on URL`
-
+
-
+
- Set the `Name ID format` to `EmailAddress`, then click `Next`.
-
+
- Select `I'm an Okta customer adding an internal app`. Complete the form with any comments and click `Finish`.
-
+
## 3. Configure ConfigCat with SAML Details from Okta
@@ -73,19 +73,19 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select the Sign On
tab.
-
+
-
Copy the URL of View IdP metadata
.
-
+
-
Paste the copied value into the Metadata URL
field at ConfigCat.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -96,16 +96,16 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select the Sign On
tab, and click on View SAML setup instructions
.
-
+
-
Copy the value of the Identity Provider Single Sign-On URL
and X.509 Certificate
fields and paste them into the Configuration dialog at ConfigCat.
-
-
+
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -120,21 +120,21 @@ To let users authenticate via SAML, you need to assign individual users or group
- Select the `Assignments` tab, and select either the `Assign to People` or the `Assign to Groups` option.
-
+
## 5. Sign In
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the Okta application.
-
+
- ConfigCat will redirect you to Okta's sign in page. Type your credentials, and click `Sign In`.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/docs/advanced/team-management/saml/identity-providers/onelogin.mdx b/website/docs/advanced/team-management/saml/identity-providers/onelogin.mdx
index 6d7f1f6c..8a654af4 100644
--- a/website/docs/advanced/team-management/saml/identity-providers/onelogin.mdx
+++ b/website/docs/advanced/team-management/saml/identity-providers/onelogin.mdx
@@ -17,19 +17,19 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to OneLogin, and select `Applications`.
-
+
- Click on `Add App`.
-
+
- Type `SAML` into the search bar, and select `SAML Custom Connector (Advanced)`.
-
+
- Enter a descriptive `Display Name`, then click `Save`.
-
+
The next step will guide you on how to collect the information required for the appearing `Configuration` page.
@@ -37,15 +37,15 @@ The next step will guide you on how to collect the information required for the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the OneLogin application's configuration page.
@@ -53,9 +53,9 @@ The next step will guide you on how to collect the information required for the
- Copy `Assertion Consumer Service` and paste it into the `ACS (Consumer) URL` field.
- Paste the same `Assertion Consumer Service` into the `ACS (Consumer) URL Validator` field in regex format e.g. `^https:\/\/dashboard\-api\.configcat\.com\/saml\/acs\/08db93fc\-c4e7\-441f\-834f\-17c804385c29$`
-
+
-
+
- Scroll down a bit on this page and configure the following:
@@ -63,15 +63,15 @@ The next step will guide you on how to collect the information required for the
- Select `Email` as `SAML nameID format`.
- Select `Both` as `SAML signature element`.
-
+
- Select `Parameters`, and make sure there is a `NameID value` entry under the `SAML Custom Connector (Advanced) Field` with the value `Email`.
-
+
- Select `SSO`, then select `SHA-256` as `SAML Signature Algorithm`.
-
+
## 3. Configure ConfigCat with SAML Details from OneLogin
@@ -82,15 +82,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select SSO
, and copy the value of Issuer URL
.
-
+
-
Paste the copied value into the Metadata URL
field at ConfigCat.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -101,19 +101,19 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select SSO
, and copy the value of SAML 2.0 Endpoint (HTTP)
, then click View Details
under the X.509 Certificate
.
-
+
-
Copy the value of the X.509 Certificate
.
-
+
-
Paste the value of the SAML 2.0 Endpoint (HTTP)
and the X.509 Certificate
into the Configuration dialog at ConfigCat
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -128,37 +128,37 @@ To let users authenticate via SAML, you need to assign the newly created applica
- Select `Users`.
-
+
- Select the user you want to get access to the application.
-
+
- Select `Applications`, then click on the `+` sign.
-
+
- Select your application, then click `Continue`.
-
+
- Click `Save`.
-
+
## 5. Sign In
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the OneLogin application.
-
+
- ConfigCat will redirect you to OneLogin's sign in page. Type your credentials, and click `Continue`.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/docs/integrations/amplitude.mdx b/website/docs/integrations/amplitude.mdx
index 3776481d..cdeb26eb 100644
--- a/website/docs/integrations/amplitude.mdx
+++ b/website/docs/integrations/amplitude.mdx
@@ -18,7 +18,7 @@ There are two available integration opportunities between ConfigCat and Amplitud
Every feature flag change in ConfigCat is annotated on the Amplitude charts as a vertical line and some details are added automatically about the change.
-
+
### Installation
@@ -41,7 +41,7 @@ Every annotation sent to Amplitude by ConfigCat has:
- **Name:** A brief summary of the change.
- **Description:** A direct link to the Product/Config/Environment of the feature flag in ConfigCat.
-
+
## Sending feature flag evaluation analytics to Amplitude Experiments {#experiments}
@@ -260,8 +260,8 @@ Check your Experiments page in Amplitude and select your feature flag as the Exp
### Usage with custom chart
If you don't have access to the Experiments feature in Amplitude, you can create a custom chart based on the `Exposure` event.
You can filter for your feature flag keys with the `Flag Key` property and visualize the different variants by using the `Variant` property as a Breakdown. Example:
-
+
### Usage with enriched user properties for your custom events.
If you use the Identify API approach, you'll be able to use the feature flag evaluation data in your current reports. You can Group Segments by your feature flag evaluations:
-
\ No newline at end of file
+
\ No newline at end of file
diff --git a/website/docs/integrations/jira.mdx b/website/docs/integrations/jira.mdx
index 21fc7f27..3826b500 100644
--- a/website/docs/integrations/jira.mdx
+++ b/website/docs/integrations/jira.mdx
@@ -8,7 +8,7 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Add ConfigCat Feature Flags to your Jira Cloud instance.
2. Select `Configure`.
@@ -21,7 +21,7 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Open any Issue on your Jira board.
2. Push `Link/Create ConfigCat Feature Flag`
@@ -30,7 +30,7 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Open any Issue on your Jira board.
2. Push `Link/Create ConfigCat Feature Flag`
@@ -41,7 +41,7 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Open an Issue on your Jira board with linked feature flag.
2. You can see the linked feature flags in the `Feature Flag (ConfigCat)` issue section.
@@ -52,26 +52,26 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Open an Issue on your Jira board with linked feature flag.
2. Remove the linked feature flag by clicking the red X in the top right corner.
### View flag status in Releases
-
+
1. Open an Issue on your Jira board with linked feature flag.
2. Check the `Releases` field values in the issue Details section to see the linked feature flags status in the Issue.
3. Click it for more detailed dialog.
-
+
1. Open a version in the project Release Hub to see the related issues feature flag status.
2. Click it for more detailed dialog.
### View linked issues in ConfigCat
-
+
1. View linked issues next to your Feature Flags in ConfigCat and jump to the Jira Issue directly.
diff --git a/website/docs/integrations/segment.mdx b/website/docs/integrations/segment.mdx
index 37e0488f..6c4038c5 100644
--- a/website/docs/integrations/segment.mdx
+++ b/website/docs/integrations/segment.mdx
@@ -18,7 +18,7 @@ There are two available integration opportunities between [ConfigCat and Twilio
Ensures that every setting change in ConfigCat is sent to Segment as a track event.
-
+
### Installation
@@ -429,4 +429,4 @@ The `variationId` is a hashed version of the feature flag value, accessible on t
### Example event
Check your source's debugger to see the events.
-
+
diff --git a/website/docs/integrations/zapier.mdx b/website/docs/integrations/zapier.mdx
index 7e576972..f4488928 100644
--- a/website/docs/integrations/zapier.mdx
+++ b/website/docs/integrations/zapier.mdx
@@ -29,7 +29,7 @@ Each Zap has one app as the **Trigger**, where your information comes from and w
1. You should select the [Product](../main-concepts.mdx#product) in which you want to get notified about the Feature Flag or Setting value changes and optionally you can filter these notifications by specific [Configs](../main-concepts.mdx#config) or [Environments](../main-concepts.mdx#environment).
-
+
1. Once that's done you can start creating an automation! Use a pre-made Zap or create your own with the Zap Editor. Creating a Zap requires no coding knowledge and you'll be walked step-by-step through the setup.
@@ -48,7 +48,7 @@ Available fields to include in your flow:
### Configuration in Zapier
-
+
### Result in Slack
diff --git a/website/src/css/custom.scss b/website/src/css/custom.scss
index 5aecdd37..41869232 100644
--- a/website/src/css/custom.scss
+++ b/website/src/css/custom.scss
@@ -50,8 +50,9 @@
height: 100%;
}
-.saml-tutorial-img {
+.bordered-img {
border: 1px solid rgb(224, 224, 224);
+ border-radius: 3px;
margin-bottom: 1rem;
}
diff --git a/website/versioned_docs/version-V1/advanced/team-management/auto-assign-users.mdx b/website/versioned_docs/version-V1/advanced/team-management/auto-assign-users.mdx
index 7a801936..974e94b5 100644
--- a/website/versioned_docs/version-V1/advanced/team-management/auto-assign-users.mdx
+++ b/website/versioned_docs/version-V1/advanced/team-management/auto-assign-users.mdx
@@ -11,14 +11,14 @@ Furthermore, you can also set which Organization roles / Product permissions the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Select the domain you want to configure, and click `RE-CONFIGURE` (or just `CONFIGURE` if you haven’t configured it yet) under the `Auto-assign status`.
-
+
- In the dialog that appears, you can select which `Organization roles` and `Product permissions` should be assigned to the newly registered users.
-
+
- When you are ready, just hit `Save`.
diff --git a/website/versioned_docs/version-V1/advanced/team-management/domain-verification.mdx b/website/versioned_docs/version-V1/advanced/team-management/domain-verification.mdx
index 214bded3..928fbe82 100644
--- a/website/versioned_docs/version-V1/advanced/team-management/domain-verification.mdx
+++ b/website/versioned_docs/version-V1/advanced/team-management/domain-verification.mdx
@@ -10,16 +10,16 @@ In order to use the [SAML Single Sign-On](../../advanced/team-management/saml/ov
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD & VERIFY DOMAIN`.
-
+
- Type your domain name, then click `ADD`
-
+
- Follow the instructions on the appearing dialog to verify your domain.
-
+
diff --git a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/adfs.mdx b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/adfs.mdx
index b3c0c7ba..2b39cfc6 100644
--- a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/adfs.mdx
+++ b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/adfs.mdx
@@ -17,77 +17,77 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and save them for further use.
- `Entity ID`
- `Assertion Consumer Service`
-
+
## 2. Configure a Relying Party Trust
- Open the ADFS Management console, and click `Add Relying Party Trust`.
-
+
- Make sure the `Claims aware` option is selected, and click `Start`.
-
+
- Select the `Enter data about this relying party manually` option, and click `Next`.
-
+
- Type a descriptive `Display name`, and click `Next`.
-
+
- No action required on the `Configure Certificate` pane, click `Next`.
-
+
- Select the `Enable support for the SAML 2.0 WebSSO protocol` option, and paste the value of `Assertion Consumer Service` from [Step 1](#1-collect-saml-metadata-from-configcat) into the `Relying party SAML 2.0 SSO service URL` field.
Then, Click `Next`.
-
+
- Paste the value of `Entity ID` from [Step 1](#1-collect-saml-metadata-from-configcat) into the `Relying party trust identifier` field, and click `Add`.
Then, click `Next`.
-
+
- No action required on the `Choose Access Control Policy` pane, click `Next`.
-
+
- Review the changes, then click `Next`.
-
+
- The Relying Party Trust is now successfully added, make sure the `Configure claims issuance policy for this application` option is checked, and click `Close`.
-
+
## 3. Configure Claims Issuance Policy
- After adding the Relying Party Trust, the following dialog should appear.
Click `Add rule`.
-
+
- Select `Send LDAP Attributes as Claims` as the `Claim rule template`, and click `Next`.
-
+
- Apply the following, and click `Finish`.
@@ -96,11 +96,11 @@ Click `Add rule`.
- Select `User-Principal-Name` as `LDAP Attribute`.
- Select `Name ID` as `Outgoing Claim Type`.
-
+
- Click `OK`.
-
+
## 4. Configure ConfigCat with SAML Details from ADFS
@@ -111,15 +111,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select Endpoints
, and copy the URL Path of the Federation Metadata
endpoint.
-
+
-
Type the URL into the Metadata URL
field at ConfigCat in the following format: https://[ADFS-DOMAIN]/[FEDERATION-METADATA-URL-PATH]
.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -130,44 +130,44 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select Endpoints
, and save the URL Path of the SAML 2.0/WS-Federation
endpoint.
-
+
-
Select Certificates
, then select the Token Signing
certificate, and click View Certificate
.
-
+
-
On the Details
tab click Copy to File
.
-
+
-
Click Next
.
-
+
-
Select the Base-64 encoded X.509 (.CER)
option, and click Next
.
-
+
-
Browse the location where the certificate should be exported, and click Next
.
-
+
-
Click Finish
.
-
+
-
Click OK
.
-
+
-
Type the SAML 2.0/WS-Federation
endpoint into the Sign-on URL
field in the following format: https://[ADFS-DOMAIN]/[WS-FEDERATION-URL-PATH]
.
Then, paste the exported Token Signing
certificate into the X.509 Certificate
field.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -180,15 +180,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address.
-
+
- ConfigCat will redirect you to the ADFS sign in page. Type your credentials, and click `Sign in`.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/auth0.mdx b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/auth0.mdx
index 1547e4b1..be6f4d7e 100644
--- a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/auth0.mdx
+++ b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/auth0.mdx
@@ -17,15 +17,15 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to Auth0, select `Applications` from the menu, then click `Create Application`.
-
+
- Enter a descriptive `Name`, select `Regular Web Applications`, then click `Create`.
-
+
- Select the `Addons` tab, and click `SAML2`.
-
+
The next step will guide you on how to collect the information required for the appearing configuration dialog.
@@ -33,15 +33,15 @@ The next step will guide you on how to collect the information required for the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the Auth0 configuration dialog.
@@ -59,9 +59,9 @@ The next step will guide you on how to collect the information required for the
}
```
-
+
-
+
- Click on `Save`.
@@ -74,15 +74,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Copy the URL of Identity Provide metadata
.
-
+
-
Paste the copied value into the Metadata URL
field at ConfigCat.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -93,12 +93,12 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Copy the value of Identity Provider Login URL
and download the Identity Provider Certificate
, then paste them into the Configuration dialog at ConfigCat.
-
-
+
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -111,15 +111,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the Auth0 application.
-
+
- ConfigCat will redirect you to Auth0's sign in page. Type your credentials, and click `Continue`.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/azure-ad.mdx b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/azure-ad.mdx
index 2d2bf9b7..b0a8a013 100644
--- a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/azure-ad.mdx
+++ b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/azure-ad.mdx
@@ -17,23 +17,23 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to the Azure Portal, go to the `Entra ID` resource, and select `Enterprise applications`.
-
+
- Click on `New application`.
-
+
- Click on `Create your own application`.
-
+
- Enter a descriptive `App name`, select the `Integrate any other application you don't find in the gallery (Non-gallery)` option, then click `Create`.
-
+
- On the `Manage` section of the application, select `Single sign-on`, then select `SAML`.
-
+
The next step will guide you on how to collect the information required for Configuring SAML in the application.
@@ -41,26 +41,26 @@ The next step will guide you on how to collect the information required for Conf
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the Enterprise application.
- `Entity ID` -> `Identifier (Entity ID)`
- `Assertion Consumer Service` -> `Reply URL (Assertion Consumer Service URL)`
-
+
-
+
-
+
## 3. Configure ConfigCat with SAML Details from Azure
@@ -71,15 +71,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Copy the value of App Federation Metadata Url
.
-
+
-
Paste the copied value into the Metadata URL
field at ConfigCat.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -90,13 +90,13 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Copy the value of Login URL
and download the Certificate (Base64)
, then paste them into the Configuration dialog at ConfigCat.
-
-
-
+
+
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -111,25 +111,25 @@ To let users authenticate via SAML, you need to assign individual users or group
- Select `Users and groups` on the `Manage` section of the menu.
-
+
- Click `Add user/group`, then select the users or groups you want to assign.
-
+
## 5. Sign In
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the Enterprise application.
-
+
- ConfigCat will redirect you to Microsoft's sign in page. Type your credentials for sign-in.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/cloudflare.mdx b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/cloudflare.mdx
index 6ba27bf6..3f220e58 100644
--- a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/cloudflare.mdx
+++ b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/cloudflare.mdx
@@ -15,15 +15,15 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to CloudFlare, go to the Zero Trust dashboard, and select `Applications` under the `Access` menu.
Then click on `Add an application`.
-
+
- Select `SaaS`.
-
+
- Enter a descriptive name in the `Application` field.
-
+
The next step will guide you on how to collect the information required for the appearing configuration section.
@@ -31,28 +31,28 @@ The next step will guide you on how to collect the information required for the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the Cloudflare application.
- `Entity ID` -> `Entity ID`
- `Assertion Consumer Service` -> `Assertion Consumer Service URL`
-
+
-
+
- Set the `Name ID Format` to `Email`.
-
+
- Click `Next` at the bottom of the page.
@@ -62,7 +62,7 @@ To let users authenticate via SAML, you need to assign groups to the Cloudflare
- Give a name for the Cloudflare Application's policy and check those groups that you want to assign.
-
+
- Click `Next` at the bottom of the page.
@@ -70,20 +70,20 @@ To let users authenticate via SAML, you need to assign groups to the Cloudflare
- Copy the value of `SSO endpoint` and `Public key` fields.
-
+
- On the ConfigCat Dashboard, select the `3. Set up ConfigCat` step, click `Manual Configuration`, then paste the copied values into the appearing fields.
- `SSO endpoint` -> `Sign-on URL`
- `Public key` -> `X.509 Certificate`
-
+
## 5. Select Trusted Domains on the SAML Configuration Dialog
- Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
- Click `Save`.
@@ -91,15 +91,15 @@ To let users authenticate via SAML, you need to assign groups to the Cloudflare
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the Cloudflare application.
-
+
- ConfigCat will redirect you to Cloudflare's sign in page.
-
+
## 6. Next Steps
diff --git a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/google.mdx b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/google.mdx
index 854f6381..8fdd88de 100644
--- a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/google.mdx
+++ b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/google.mdx
@@ -17,15 +17,15 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to Google Admin console, select `Apps` from the side menu, then select `Web and mobile apps`.
-
+
- Click `Add App`, then select `Add custom SAML app`.
-
+
- Enter a descriptive `App name`, then click `CONTINUE`.
-
+
The next step will guide you on how to configure ConfigCat with appearing information.
@@ -33,27 +33,27 @@ The next step will guide you on how to configure ConfigCat with appearing inform
- Copy the value of `SSO URL` and `Certificate` fields and save them for further use.
-
+
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- Select the `3. Set up ConfigCat` step, click `Manual Configuration`, then paste the copied values into the appearing fields.
-
+
- Click `CONTINUE` on the Google App configuration.
-
+
The next step will guide you on how to configure the Google App with details provided by ConfigCat.
@@ -64,24 +64,24 @@ The next step will guide you on how to configure the Google App with details pro
- `Entity ID` -> `Entity ID`
- `Assertion Consumer Service` -> `ACS URL`
-
+
- Make sure the `Signed response` option is checked.
- Select `EMAIL` as `Name ID format`.
- Select `Basic Information > Primary email` as `Name ID`.
- Click `CONTINUE`.
-
+
- Click `FINISH`.
-
+
## 4. Select Trusted Domains on the SAML Configuration Dialog
- Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
- Click `Save`.
@@ -89,25 +89,25 @@ The next step will guide you on how to configure the Google App with details pro
- Click on `View details` under the `User access` section.
-
+
- Select `ON for everyone`, then click `SAVE`.
-
+
## 6. Sign In
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address used in Google.
-
+
- ConfigCat will redirect you to Google's sign in page. Type your credentials, and sign in.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/okta.mdx b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/okta.mdx
index 4536feac..4318cffb 100644
--- a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/okta.mdx
+++ b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/okta.mdx
@@ -17,19 +17,19 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to Okta, go to the admin dashboard, and select `Applications`.
-
+
- Click on `Create App Integration`.
-
+
- Select `SAML 2.0` as the Sign-in method.
-
+
- Enter a descriptive `App name`, then click `Next`.
-
+
The next step will guide you on how to collect the information required for the appearing `Configure SAML` section.
@@ -37,32 +37,32 @@ The next step will guide you on how to collect the information required for the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the Okta application.
- `Entity ID` -> `Audience URI (SP Entity ID)`
- `Assertion Consumer Service` -> `Single sign on URL`
-
+
-
+
- Set the `Name ID format` to `EmailAddress`, then click `Next`.
-
+
- Select `I'm an Okta customer adding an internal app`. Complete the form with any comments and click `Finish`.
-
+
## 3. Configure ConfigCat with SAML Details from Okta
@@ -73,19 +73,19 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select the Sign On
tab.
-
+
-
Copy the URL of View IdP metadata
.
-
+
-
Paste the copied value into the Metadata URL
field at ConfigCat.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -96,16 +96,16 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select the Sign On
tab, and click on View SAML setup instructions
.
-
+
-
Copy the value of the Identity Provider Single Sign-On URL
and X.509 Certificate
fields and paste them into the Configuration dialog at ConfigCat.
-
-
+
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -120,21 +120,21 @@ To let users authenticate via SAML, you need to assign individual users or group
- Select the `Assignments` tab, and select either the `Assign to People` or the `Assign to Groups` option.
-
+
## 5. Sign In
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the Okta application.
-
+
- ConfigCat will redirect you to Okta's sign in page. Type your credentials, and click `Sign In`.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/onelogin.mdx b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/onelogin.mdx
index 6d7f1f6c..8a654af4 100644
--- a/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/onelogin.mdx
+++ b/website/versioned_docs/version-V1/advanced/team-management/saml/identity-providers/onelogin.mdx
@@ -17,19 +17,19 @@ Each SSO Identity Provider requires specific information to configure a SAML int
- Log in to OneLogin, and select `Applications`.
-
+
- Click on `Add App`.
-
+
- Type `SAML` into the search bar, and select `SAML Custom Connector (Advanced)`.
-
+
- Enter a descriptive `Display Name`, then click `Save`.
-
+
The next step will guide you on how to collect the information required for the appearing `Configuration` page.
@@ -37,15 +37,15 @@ The next step will guide you on how to collect the information required for the
- Open your organization's authentication settings on the ConfigCat Dashboard.
-
+
- Click `ADD SAML IDENTITY PROVIDER`.
-
+
- Give a name for your Identity Provider, and click `Create`.
-
+
- From the next section of the dialog, copy the following values and paste them into the OneLogin application's configuration page.
@@ -53,9 +53,9 @@ The next step will guide you on how to collect the information required for the
- Copy `Assertion Consumer Service` and paste it into the `ACS (Consumer) URL` field.
- Paste the same `Assertion Consumer Service` into the `ACS (Consumer) URL Validator` field in regex format e.g. `^https:\/\/dashboard\-api\.configcat\.com\/saml\/acs\/08db93fc\-c4e7\-441f\-834f\-17c804385c29$`
-
+
-
+
- Scroll down a bit on this page and configure the following:
@@ -63,15 +63,15 @@ The next step will guide you on how to collect the information required for the
- Select `Email` as `SAML nameID format`.
- Select `Both` as `SAML signature element`.
-
+
- Select `Parameters`, and make sure there is a `NameID value` entry under the `SAML Custom Connector (Advanced) Field` with the value `Email`.
-
+
- Select `SSO`, then select `SHA-256` as `SAML Signature Algorithm`.
-
+
## 3. Configure ConfigCat with SAML Details from OneLogin
@@ -82,15 +82,15 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select SSO
, and copy the value of Issuer URL
.
-
+
-
Paste the copied value into the Metadata URL
field at ConfigCat.
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -101,19 +101,19 @@ You can choose one of the following options to configure ConfigCat with SAML Ide
-
Select SSO
, and copy the value of SAML 2.0 Endpoint (HTTP)
, then click View Details
under the X.509 Certificate
.
-
+
-
Copy the value of the X.509 Certificate
.
-
+
-
Paste the value of the SAML 2.0 Endpoint (HTTP)
and the X.509 Certificate
into the Configuration dialog at ConfigCat
-
+
-
Select the trusted domains. Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.
-
+
-
Click on
Save
.
@@ -128,37 +128,37 @@ To let users authenticate via SAML, you need to assign the newly created applica
- Select `Users`.
-
+
- Select the user you want to get access to the application.
-
+
- Select `Applications`, then click on the `+` sign.
-
+
- Select your application, then click `Continue`.
-
+
- Click `Save`.
-
+
## 5. Sign In
- Go to the ConfigCat Log In page, and click `COMPANY ACCOUNT - SAML`.
-
+
- Sign in with your company email address assigned to the OneLogin application.
-
+
- ConfigCat will redirect you to OneLogin's sign in page. Type your credentials, and click `Continue`.
-
+
- You should be redirected to ConfigCat signed in with your company account.
diff --git a/website/versioned_docs/version-V1/integrations/amplitude.mdx b/website/versioned_docs/version-V1/integrations/amplitude.mdx
index 3776481d..cdeb26eb 100644
--- a/website/versioned_docs/version-V1/integrations/amplitude.mdx
+++ b/website/versioned_docs/version-V1/integrations/amplitude.mdx
@@ -18,7 +18,7 @@ There are two available integration opportunities between ConfigCat and Amplitud
Every feature flag change in ConfigCat is annotated on the Amplitude charts as a vertical line and some details are added automatically about the change.
-
+
### Installation
@@ -41,7 +41,7 @@ Every annotation sent to Amplitude by ConfigCat has:
- **Name:** A brief summary of the change.
- **Description:** A direct link to the Product/Config/Environment of the feature flag in ConfigCat.
-
+
## Sending feature flag evaluation analytics to Amplitude Experiments {#experiments}
@@ -260,8 +260,8 @@ Check your Experiments page in Amplitude and select your feature flag as the Exp
### Usage with custom chart
If you don't have access to the Experiments feature in Amplitude, you can create a custom chart based on the `Exposure` event.
You can filter for your feature flag keys with the `Flag Key` property and visualize the different variants by using the `Variant` property as a Breakdown. Example:
-
+
### Usage with enriched user properties for your custom events.
If you use the Identify API approach, you'll be able to use the feature flag evaluation data in your current reports. You can Group Segments by your feature flag evaluations:
-
\ No newline at end of file
+
\ No newline at end of file
diff --git a/website/versioned_docs/version-V1/integrations/jira.mdx b/website/versioned_docs/version-V1/integrations/jira.mdx
index 21fc7f27..3826b500 100644
--- a/website/versioned_docs/version-V1/integrations/jira.mdx
+++ b/website/versioned_docs/version-V1/integrations/jira.mdx
@@ -8,7 +8,7 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Add ConfigCat Feature Flags to your Jira Cloud instance.
2. Select `Configure`.
@@ -21,7 +21,7 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Open any Issue on your Jira board.
2. Push `Link/Create ConfigCat Feature Flag`
@@ -30,7 +30,7 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Open any Issue on your Jira board.
2. Push `Link/Create ConfigCat Feature Flag`
@@ -41,7 +41,7 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Open an Issue on your Jira board with linked feature flag.
2. You can see the linked feature flags in the `Feature Flag (ConfigCat)` issue section.
@@ -52,26 +52,26 @@ Turn features On / Off right from a linked Issue on your Jira board with
+
1. Open an Issue on your Jira board with linked feature flag.
2. Remove the linked feature flag by clicking the red X in the top right corner.
### View flag status in Releases
-
+
1. Open an Issue on your Jira board with linked feature flag.
2. Check the `Releases` field values in the issue Details section to see the linked feature flags status in the Issue.
3. Click it for more detailed dialog.
-
+
1. Open a version in the project Release Hub to see the related issues feature flag status.
2. Click it for more detailed dialog.
### View linked issues in ConfigCat
-
+
1. View linked issues next to your Feature Flags in ConfigCat and jump to the Jira Issue directly.
diff --git a/website/versioned_docs/version-V1/integrations/segment.mdx b/website/versioned_docs/version-V1/integrations/segment.mdx
index 37e0488f..6c4038c5 100644
--- a/website/versioned_docs/version-V1/integrations/segment.mdx
+++ b/website/versioned_docs/version-V1/integrations/segment.mdx
@@ -18,7 +18,7 @@ There are two available integration opportunities between [ConfigCat and Twilio
Ensures that every setting change in ConfigCat is sent to Segment as a track event.
-
+
### Installation
@@ -429,4 +429,4 @@ The `variationId` is a hashed version of the feature flag value, accessible on t
### Example event
Check your source's debugger to see the events.
-
+
diff --git a/website/versioned_docs/version-V1/integrations/zapier.mdx b/website/versioned_docs/version-V1/integrations/zapier.mdx
index 7e576972..335e4be6 100644
--- a/website/versioned_docs/version-V1/integrations/zapier.mdx
+++ b/website/versioned_docs/version-V1/integrations/zapier.mdx
@@ -29,7 +29,7 @@ Each Zap has one app as the **Trigger**, where your information comes from and w
1. You should select the [Product](../main-concepts.mdx#product) in which you want to get notified about the Feature Flag or Setting value changes and optionally you can filter these notifications by specific [Configs](../main-concepts.mdx#config) or [Environments](../main-concepts.mdx#environment).
-
+
1. Once that's done you can start creating an automation! Use a pre-made Zap or create your own with the Zap Editor. Creating a Zap requires no coding knowledge and you'll be walked step-by-step through the setup.
@@ -48,11 +48,11 @@ Available fields to include in your flow:
### Configuration in Zapier
-
+
### Result in Slack
-
+
## Need help?