Skip to content

Commit

Permalink
Fix link to anchor for Big Bang
Browse files Browse the repository at this point in the history
  • Loading branch information
a-dabrowski-sauce committed Jan 26, 2024
1 parent a942f9b commit 06135ae
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion docs/basics/sso/configuring-sso-in-okta.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Sauce Labs app from the Okta catalog supports the following features:
- [SP-initiated SSO](/basics/sso/logging-in-via-sso/#service-provider-sp-initiated-sso).
- [IdP-initiated SSO](/basics/sso/logging-in-via-sso/#identity-provider-idp-initiated-sso).
- [JIT (Just-In-Time) Provisioning](/basics/sso/setting-up-sso/#just-in-time-jit-provisioning).
- [Big Bang configuration](/basics/sso/setting-up-sso/#enforce-saml-sso-big-bang-configuration).
- [Big Bang configuration](/basics/sso/setting-up-sso/#enforce-saml-sso---big-bang-configuration).

Complete the following steps to set up SAML SSO integration between Okta and Sauce Labs:

Expand Down
2 changes: 1 addition & 1 deletion docs/basics/sso/migration-from-deprecated-sso.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ You will have access to the configuration panels of both integrations in the Tea
| SP-initiated Flow | The new SSO supports both [Service Provider (SP) initiated and Identity Provider (IdP) initiated SSO](/basics/sso/logging-in-via-sso), whereas the deprecated SSO only supports IdP-initiated flow. |
| Email Domains | Assign your [company email domains](/basics/sso/setting-up-sso/#email-domains) to your SSO integration at Sauce Labs to allow for provisioning of new accounts via SP-initiated flow. <br/><br/> The deprecated SSO does not require email domains as it does not support SP-initiated flow. |
| JIT Provisioning | In the new SSO, JIT (Just-In-Time) provisioning is enabled by default and cannot be disabled. This means that if a user from your Identity Provider (IdP) does not have a Sauce Labs account, one will be automatically created for them. <br/><br/> However, in the deprecated SSO, it was possible to disable this feature. In such cases, it's important to note that users from the IdP who do not have accounts in Sauce Labs will still be able to provision accounts automatically. Keep this in mind during the migration process from deprecated SSO to the new SSO. |
| Enforce SAML SSO | This [setting](/basics/sso/setting-up-sso/#enforce-saml-sso-big-bang-configuration) is also present in the new SSO, but it is common to both the new SSO and the deprecated SSO. When turned on, it allows authentication only via either the new SSO or the deprecated SSO. When turned off, users can also log in via username and password, in addition to SSO authentication. |
| Enforce SAML SSO | This [setting](/basics/sso/setting-up-sso/#enforce-saml-sso---big-bang-configuration) is also present in the new SSO, but it is common to both the new SSO and the deprecated SSO. When turned on, it allows authentication only via either the new SSO or the deprecated SSO. When turned off, users can also log in via username and password, in addition to SSO authentication. |
| User Identifier (NameID) | The [Name ID format](/basics/sso/setting-up-sso/#name-id) must be set to `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` in the new SSO. The value of the attribute NameID in the SAML response must be a valid email address. We do not accept non-email address values, such as usernames or IDs. <br/><br/> The deprecated SSO accepts any value in NameID, such as usernames, email addresses, or other user identifiers. |
| No Unique Identifier String (UIS) | In the new SSO, there is no need to specify the [Unique Identifier String](/basics/acct-team-mgmt/org-settings/#single-sign-on-settings-deprecated-flow) which was used in the deprecated SSO to generate usernames for new users.<br/><br/>Usernames for accounts provisioned via the new SSO are generated according to the [following pattern](/basics/sso/setting-up-sso/#usernames). |
| Team Placement | New users are provisioned in the [default team](/basics/sso/setting-up-sso/#team-placement) in the new SSO, unlike the deprecated SSO where you can specify a team for new user provisioning. |
Expand Down
2 changes: 1 addition & 1 deletion docs/basics/sso/setting-up-sso.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Sauce Labs supports the following features:
- [SP-initiated SSO](/basics/sso/logging-in-via-sso/#service-provider-sp-initiated-sso).
- [IdP-initiated SSO](/basics/sso/logging-in-via-sso/#identity-provider-idp-initiated-sso).
- [JIT (Just-In-Time) Provisioning](#just-in-time-jit-provisioning).
- [Force authentication](#enforce-saml-sso-big-bang-configuration).
- [Force authentication](#enforce-saml-sso---big-bang-configuration).

## What You'll Need

Expand Down

0 comments on commit 06135ae

Please sign in to comment.