diff --git a/website/docs/users-sources/sources/social-logins/discord/index.md b/website/docs/users-sources/sources/social-logins/discord/index.md index 64ddcbc6feee..8f93765297ea 100644 --- a/website/docs/users-sources/sources/social-logins/discord/index.md +++ b/website/docs/users-sources/sources/social-logins/discord/index.md @@ -10,7 +10,7 @@ Allows users to authenticate using their Discord credentials The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## Discord diff --git a/website/docs/users-sources/sources/social-logins/facebook/index.md b/website/docs/users-sources/sources/social-logins/facebook/index.md index 91f690ddd56b..b70af06979aa 100644 --- a/website/docs/users-sources/sources/social-logins/facebook/index.md +++ b/website/docs/users-sources/sources/social-logins/facebook/index.md @@ -10,7 +10,7 @@ Adding Facebook as a source allows users to authenticate through authentik using The following placeholders are used: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## Facebook configuration diff --git a/website/docs/users-sources/sources/social-logins/github/index.md b/website/docs/users-sources/sources/social-logins/github/index.md index 1f467812565c..be7961a5dd30 100644 --- a/website/docs/users-sources/sources/social-logins/github/index.md +++ b/website/docs/users-sources/sources/social-logins/github/index.md @@ -10,7 +10,7 @@ Allows users to authenticate using their Github credentials The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. - `www.my.company` Homepage URL for your site ## Github diff --git a/website/docs/users-sources/sources/social-logins/google/index.md b/website/docs/users-sources/sources/social-logins/google/index.md index e4312dd0e669..618dbf682931 100644 --- a/website/docs/users-sources/sources/social-logins/google/index.md +++ b/website/docs/users-sources/sources/social-logins/google/index.md @@ -10,7 +10,7 @@ Allows users to authenticate using their Google credentials The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## Google diff --git a/website/docs/users-sources/sources/social-logins/mailcow/index.md b/website/docs/users-sources/sources/social-logins/mailcow/index.md index 18d91c79e0b4..13bb091cb35b 100644 --- a/website/docs/users-sources/sources/social-logins/mailcow/index.md +++ b/website/docs/users-sources/sources/social-logins/mailcow/index.md @@ -10,8 +10,8 @@ Allows users to authenticate using their Mailcow credentials The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. -- `mailcow.company` is the FQDN of the mailcow install. +- `authentik.company` is the FQDN of the authentik installation. +- `mailcow.company` is the FQDN of the mailcow installation. ## Mailcow diff --git a/website/docs/users-sources/sources/social-logins/twitch/index.md b/website/docs/users-sources/sources/social-logins/twitch/index.md index 56f8dada45ac..766909b9f99a 100644 --- a/website/docs/users-sources/sources/social-logins/twitch/index.md +++ b/website/docs/users-sources/sources/social-logins/twitch/index.md @@ -10,7 +10,7 @@ Allows users to authenticate using their Twitch credentials The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## Twitch diff --git a/website/docs/users-sources/sources/social-logins/twitter/index.md b/website/docs/users-sources/sources/social-logins/twitter/index.md index d70a408f9038..351fa524d0f3 100644 --- a/website/docs/users-sources/sources/social-logins/twitter/index.md +++ b/website/docs/users-sources/sources/social-logins/twitter/index.md @@ -10,7 +10,7 @@ Allows users to authenticate using their twitter credentials The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## Twitter diff --git a/website/integrations/services/actual-budget/index.mdx b/website/integrations/services/actual-budget/index.mdx index 04a182ecf899..33644c828165 100644 --- a/website/integrations/services/actual-budget/index.mdx +++ b/website/integrations/services/actual-budget/index.mdx @@ -20,8 +20,8 @@ sidebar_label: Actual Budget The following placeholders are used in this guide: -- _actual.company_ is the FQDN of the Actual Budget install. -- _authentik.company_ is the FQDN of the authentik install. +- `actual.company` is the FQDN of the Actual Budget installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/apache-guacamole/index.mdx b/website/integrations/services/apache-guacamole/index.mdx index d0a8b4af5938..97d78664c286 100644 --- a/website/integrations/services/apache-guacamole/index.mdx +++ b/website/integrations/services/apache-guacamole/index.mdx @@ -17,8 +17,8 @@ sidebar_label: Apache Guacamoleā„¢ The following placeholders are used in this guide: -- `guacamole.company` is the FQDN of the Guacamole install. -- `authentik.company` is the FQDN of the authentik install. +- `guacamole.company` is the FQDN of the Guacamole installation. +- `authentik.company` is the FQDN of the authentik installation. Create an OAuth2/OpenID provider with the following parameters: diff --git a/website/integrations/services/argocd/index.md b/website/integrations/services/argocd/index.md index 10b5bfe7fa80..88f248f01b3f 100644 --- a/website/integrations/services/argocd/index.md +++ b/website/integrations/services/argocd/index.md @@ -17,8 +17,8 @@ sidebar_label: ArgoCD The following placeholders are used in this guide: -- `argocd.company` is the FQDN of the ArgoCD install. -- `authentik.company` is the FQDN of the authentik install. +- `argocd.company` is the FQDN of the ArgoCD installation. +- `authentik.company` is the FQDN of the authentik installation. :::note Only settings that have been modified from default have been listed. diff --git a/website/integrations/services/aruba-orchestrator/index.md b/website/integrations/services/aruba-orchestrator/index.md index a71c1914c4c9..a77f65e44051 100644 --- a/website/integrations/services/aruba-orchestrator/index.md +++ b/website/integrations/services/aruba-orchestrator/index.md @@ -17,8 +17,8 @@ sidebar_label: Aruba Orchestrator The following placeholders are used in this guide: -- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator install. -- `authentik.company` is the FQDN of the authentik install. +- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator installation. +- `authentik.company` is the FQDN of the authentik installation. - `SSL Certificate` is the name of the SSL certificate used to sign outgoing responses. ## authentik Configuration diff --git a/website/integrations/services/awx-tower/index.md b/website/integrations/services/awx-tower/index.md index c3926fe79f4d..a9b036069c6a 100644 --- a/website/integrations/services/awx-tower/index.md +++ b/website/integrations/services/awx-tower/index.md @@ -25,8 +25,8 @@ AWX is the open-source version of RHAAP. The term "AWX" will be used interchange The following placeholders are used in this guide: -- `awx.company` is the FQDN of the AWX/RHAAP install. -- `authentik.company` is the FQDN of the authentik install. +- `awx.company` is the FQDN of the AWX/RHAAP installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: diff --git a/website/integrations/services/budibase/index.md b/website/integrations/services/budibase/index.md index e08f43eac67b..a45d89e4edb8 100644 --- a/website/integrations/services/budibase/index.md +++ b/website/integrations/services/budibase/index.md @@ -17,8 +17,8 @@ sidebar_label: Budibase The following placeholders are used in this guide: -- `budibase.company` is the FQDN of the Budibase install. -- `authentik.company` is the FQDN of the authentik install. +- `budibase.company` is the FQDN of the Budibase installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: diff --git a/website/integrations/services/chronograf/index.md b/website/integrations/services/chronograf/index.md index d6c782c6595a..73433652a5a7 100644 --- a/website/integrations/services/chronograf/index.md +++ b/website/integrations/services/chronograf/index.md @@ -17,8 +17,8 @@ sidebar_label: Chronograf The following placeholders are used in this guide: -- `chronograf.company` is the FQDN of your Chronograf install. -- `authentik.company` is the FQDN of your authentik install. +- `chronograf.company` is the FQDN of your Chronograf installation. +- `authentik.company` is the FQDN of your authentik installation. ## authentik configuration diff --git a/website/integrations/services/cloudflare-access/index.mdx b/website/integrations/services/cloudflare-access/index.mdx index 04f1e1fa8894..728c72bed3fd 100644 --- a/website/integrations/services/cloudflare-access/index.mdx +++ b/website/integrations/services/cloudflare-access/index.mdx @@ -18,7 +18,7 @@ sidebar_label: Cloudflare Access The following placeholders are used in this guide: - `company.cloudflareaccess.com` is the FQDN of your Cloudflare Access subdomain. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. To proceed, you need to register for a free Cloudflare Access account and have both a Cloudflare account and a publicly accessible authentik instance with a trusted SSL certificate. diff --git a/website/integrations/services/dokuwiki/index.md b/website/integrations/services/dokuwiki/index.md index 02a6b55ed388..ead3dbe3047a 100644 --- a/website/integrations/services/dokuwiki/index.md +++ b/website/integrations/services/dokuwiki/index.md @@ -17,8 +17,8 @@ From https://en.wikipedia.org/wiki/DokuWiki The following placeholders are used in this guide: -- `dokuwiki.company` is the FQDN of the DokiWiki install. -- `authentik.company` is the FQDN of the authentik install. +- `dokuwiki.company` is the FQDN of the DokiWiki installation. +- `authentik.company` is the FQDN of the authentik installation. ## DokuWiki configuration diff --git a/website/integrations/services/engomo/index.md b/website/integrations/services/engomo/index.md index 6f59c5b37161..e250450ca2e8 100644 --- a/website/integrations/services/engomo/index.md +++ b/website/integrations/services/engomo/index.md @@ -18,8 +18,8 @@ sidebar_label: engomo The following placeholders are used in this guide: -- `engomo.company` is the FQDN of the engomo install. -- `authentik.company` is the FQDN of the authentik install. +- `engomo.company` is the FQDN of the engomo installation. +- `authentik.company` is the FQDN of the authentik installation. - `engomo.mapping` is the name of the Scope Mapping. - `ak.cert` is the self-signed certificate that will be used for the service provider. diff --git a/website/integrations/services/espoCRM/index.md b/website/integrations/services/espoCRM/index.md index d3ac6c7a83f1..fd7b1dd4a57f 100644 --- a/website/integrations/services/espoCRM/index.md +++ b/website/integrations/services/espoCRM/index.md @@ -21,8 +21,8 @@ This guide does _not_ cover Team Mapping. Please refer to EspoCRM's [documentati The following placeholders are used in this guide: -- `crm.` is the FQDN of the EspoCRM install. -- `authentik.` is the FQDN of the authentik install. +- `crm.` is the FQDN of the EspoCRM installation. +- `authentik.` is the FQDN of the authentik installation. - `_SLUG_` is the slug you choose upon application create in authentik. ## authentik configuration diff --git a/website/integrations/services/firezone/index.md b/website/integrations/services/firezone/index.md index bc3895096ed7..bb1753066e7b 100644 --- a/website/integrations/services/firezone/index.md +++ b/website/integrations/services/firezone/index.md @@ -17,9 +17,9 @@ sidebar_label: Firezone The following placeholders are used in this guide: -- `firezone.company` is the FQDN of the Firezone install. +- `firezone.company` is the FQDN of the Firezone installation. - `authentik` is the unique ID used to generate logins for this provider. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. Create an OAuth2/OpenID provider with the following parameters: diff --git a/website/integrations/services/fortigate-admin/index.md b/website/integrations/services/fortigate-admin/index.md index 8b28fac231f3..97d9c28c244b 100644 --- a/website/integrations/services/fortigate-admin/index.md +++ b/website/integrations/services/fortigate-admin/index.md @@ -18,8 +18,8 @@ sidebar_label: FortiGate Admin Login The following placeholders are used in this guide: -- `fgt.company` is the FQDN of the FortiGate install. -- `authentik.company` is the FQDN of the authentik install. +- `fgt.company` is the FQDN of the FortiGate installation. +- `authentik.company` is the FQDN of the authentik installation. - `fgt.mapping` is the name of the SAML Property Mapping. - `ak.cert` = The authentik self-signed certificate you use for the service provider. diff --git a/website/integrations/services/fortimanager/index.md b/website/integrations/services/fortimanager/index.md index 0c8a5c94198d..a5a239e2340a 100644 --- a/website/integrations/services/fortimanager/index.md +++ b/website/integrations/services/fortimanager/index.md @@ -19,8 +19,8 @@ sidebar_label: FortiManager The following placeholders are used in this guide: -- `fgm.company` is the FQDN of the FortiManager install. -- `authentik.company` is the FQDN of the authentik install. +- `fgm.company` is the FQDN of the FortiManager installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application and Provider in authentik, note the slug, as this will be used later. Create a SAML provider with the following parameters: diff --git a/website/integrations/services/frappe/index.md b/website/integrations/services/frappe/index.md index 3c7532eb9a1d..1a671615b67f 100644 --- a/website/integrations/services/frappe/index.md +++ b/website/integrations/services/frappe/index.md @@ -21,8 +21,8 @@ These instructions apply to all projects in the Frappe Family. The following placeholders are used in this guide: -- `frappe.company` is the FQDN of the Frappe install. -- `authentik.company` is the FQDN of the authentik install. +- `frappe.company` is the FQDN of the Frappe installation. +- `authentik.company` is the FQDN of the authentik installation. - `provider` is the name for the social login provider in Frappe. ## authentik configuration diff --git a/website/integrations/services/freshrss/index.md b/website/integrations/services/freshrss/index.md index 2a86d66d90fc..0937c6173a5d 100644 --- a/website/integrations/services/freshrss/index.md +++ b/website/integrations/services/freshrss/index.md @@ -17,9 +17,9 @@ sidebar_label: FreshRSS The following placeholders are used in this guide: -- `freshrss.company` is the FQDN of the FreshRSS install. +- `freshrss.company` is the FQDN of the FreshRSS installation. - `port` is the port on which the FreshRSS install is running (usually 443) -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/gatus/index.md b/website/integrations/services/gatus/index.md index ce745c5d969e..2d90ecff73cc 100644 --- a/website/integrations/services/gatus/index.md +++ b/website/integrations/services/gatus/index.md @@ -17,8 +17,8 @@ sidebar_label: Gatus The following placeholders are used in this guide: -- `gatus.company` is the FQDN of the Gatus install. -- `authentik.company` is the FQDN of the authentik install. +- `gatus.company` is the FQDN of the Gatus installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/glitchtip/index.md b/website/integrations/services/glitchtip/index.md index a4fc811b49c1..810625c9afb0 100644 --- a/website/integrations/services/glitchtip/index.md +++ b/website/integrations/services/glitchtip/index.md @@ -17,8 +17,8 @@ sidebar_label: Glitchtip The following placeholders are used in this guide: -- `glitchtip.company` is the FQDN of the Glitchtip install. -- `authentik.company` is the FQDN of the authentik install. +- `glitchtip.company` is the FQDN of the Glitchtip installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/globalprotect/index.md b/website/integrations/services/globalprotect/index.md index 14d07fe8377f..16ae538b3c32 100644 --- a/website/integrations/services/globalprotect/index.md +++ b/website/integrations/services/globalprotect/index.md @@ -20,7 +20,7 @@ sidebar_label: GlobalProtect The following placeholders are used in this guide: - `gp.company` is the FQDN of the GlobalProtect portal. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. :::caution A trusted web certificate is required to be bound to the GlobalProtect Portal. This can be signed by a trusted internal Root Certificate Authority (CA); however, a self signed certificate, a certificate outside of its validity, or a non-standard confirming certificate (such as a lifespan not trusted by modern browsers) will error out on SAML authentication. diff --git a/website/integrations/services/google/index.md b/website/integrations/services/google/index.md index 6ff5e7cd2386..24b8375e9244 100644 --- a/website/integrations/services/google/index.md +++ b/website/integrations/services/google/index.md @@ -17,7 +17,7 @@ sidebar_label: Google Workspace The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. - `example.com` is the default E-mail address configured in Google workspace. ## authentik Configuration diff --git a/website/integrations/services/grafana/index.mdx b/website/integrations/services/grafana/index.mdx index 1859da4471e0..94d3423742c4 100644 --- a/website/integrations/services/grafana/index.mdx +++ b/website/integrations/services/grafana/index.mdx @@ -17,8 +17,8 @@ sidebar_label: Grafana The following placeholders are used in this guide: -- `grafana.company` is the FQDN of the Grafana install. -- `authentik.company` is the FQDN of the authentik install. +- `grafana.company` is the FQDN of the Grafana installation. +- `authentik.company` is the FQDN of the authentik installation. Create an OAuth2/OpenID provider with the following parameters: diff --git a/website/integrations/services/gravitee/index.md b/website/integrations/services/gravitee/index.md index 6d490d1bfa49..5df4a0776fda 100644 --- a/website/integrations/services/gravitee/index.md +++ b/website/integrations/services/gravitee/index.md @@ -19,8 +19,8 @@ sidebar_label: Gravitee The following placeholders are used in this guide: -- `gravitee.company` is the FQDN of the Gravitee install. -- `authentik.company` is the FQDN of the authentik install. +- `gravitee.company` is the FQDN of the Gravitee installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/harbor/index.md b/website/integrations/services/harbor/index.md index 61a44c256de9..6e68589105ca 100644 --- a/website/integrations/services/harbor/index.md +++ b/website/integrations/services/harbor/index.md @@ -17,8 +17,8 @@ sidebar_label: Harbor The following placeholders are used in this guide: -- `harbor.company` is the FQDN of the Harbor install. -- `authentik.company` is the FQDN of the authentik install. +- `harbor.company` is the FQDN of the Harbor installation. +- `authentik.company` is the FQDN of the authentik installation. Create an OAuth2/OpenID provider with the following parameters: diff --git a/website/integrations/services/hedgedoc/index.md b/website/integrations/services/hedgedoc/index.md index a3ab15b9efb7..1d72c9cdea6f 100644 --- a/website/integrations/services/hedgedoc/index.md +++ b/website/integrations/services/hedgedoc/index.md @@ -17,8 +17,8 @@ sidebar_label: HedgeDoc The following placeholders are used in this guide: -- `hedgedoc.company` is the FQDN of the HedgeDoc install. -- `authentik.company` is the FQDN of the authentik install. +- `hedgedoc.company` is the FQDN of the HedgeDoc installation. +- `authentik.company` is the FQDN of the authentik installation. Create an OAuth2/OpenID provider with the following parameters: diff --git a/website/integrations/services/hoarder/index.md b/website/integrations/services/hoarder/index.md index 21df4bc8398f..9b5b40319b54 100644 --- a/website/integrations/services/hoarder/index.md +++ b/website/integrations/services/hoarder/index.md @@ -17,8 +17,8 @@ sidebar_label: Hoarder The following placeholders are used in this guide: -- `hoarder.company` is the FQDN of the Hoarder install. -- `authentik.company` is the FQDN of the authentik install. +- `hoarder.company` is the FQDN of the Hoarder installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/home-assistant/index.md b/website/integrations/services/home-assistant/index.md index 573db6aa69f5..f900445f63a5 100644 --- a/website/integrations/services/home-assistant/index.md +++ b/website/integrations/services/home-assistant/index.md @@ -27,8 +27,8 @@ For Home Assistant to work with authentik, a custom integration needs to be inst The following placeholders are used in this guide: -- `hass.company` is the FQDN of the Home Assistant install. -- `authentik.company` is the FQDN of the authentik install. +- `hass.company` is the FQDN of the Home Assistant installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/immich/index.md b/website/integrations/services/immich/index.md index 2b492dbc0037..517d1f79d919 100644 --- a/website/integrations/services/immich/index.md +++ b/website/integrations/services/immich/index.md @@ -18,7 +18,7 @@ sidebar_label: Immich The following placeholders are used in this guide: - `https://immich.company` is the URL used to access the Immich instance. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/jellyfin/index.md b/website/integrations/services/jellyfin/index.md index f09c267ef8bc..4197eb44bf31 100644 --- a/website/integrations/services/jellyfin/index.md +++ b/website/integrations/services/jellyfin/index.md @@ -29,8 +29,8 @@ An LDAP outpost must be deployed to use the Jellyfin LDAP plugin The following placeholders are used in this guide: -- `jellyfin.company` is the FQDN of the Jellyfin install. -- `authentik.company` is the FQDN of the authentik install. +- `jellyfin.company` is the FQDN of the Jellyfin installation. +- `authentik.company` is the FQDN of the authentik installation. - `ldap.company` the FQDN of the LDAP outpost. - `dc=company,dc=com` the Base DN of the LDAP outpost. - `ldap_bind_user` the username of the desired LDAP Bind User diff --git a/website/integrations/services/jenkins/index.md b/website/integrations/services/jenkins/index.md index 30ba45081ed2..f31a4a8c337d 100644 --- a/website/integrations/services/jenkins/index.md +++ b/website/integrations/services/jenkins/index.md @@ -17,8 +17,8 @@ sidebar_label: Jenkins The following placeholders are used in this guide: -- `jenkins.company` is the FQDN of the Service install. -- `authentik.company` is the FQDN of the authentik install. +- `jenkins.company` is the FQDN of the Service installation. +- `authentik.company` is the FQDN of the authentik installation. Create an OAuth2/OpenID provider with the following parameters: diff --git a/website/integrations/services/komga/index.md b/website/integrations/services/komga/index.md index db999a2b341f..aedac93af0d0 100644 --- a/website/integrations/services/komga/index.md +++ b/website/integrations/services/komga/index.md @@ -17,8 +17,8 @@ sidebar_label: Komga The following placeholders are used in this guide: -- `komga.company` is the FQDN of the Komga install. -- `authentik.company` is the FQDN of the authentik install. +- `komga.company` is the FQDN of the Komga installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/linkwarden/index.md b/website/integrations/services/linkwarden/index.md index 4193d6a164b8..232ddea020fa 100644 --- a/website/integrations/services/linkwarden/index.md +++ b/website/integrations/services/linkwarden/index.md @@ -17,8 +17,8 @@ sidebar_label: Linkwarden The following placeholders are used in this guide: -- `linkwarden.company` is the FQDN of the Linkwarden install. -- `authentik.company` is the FQDN of the authentik install. +- `linkwarden.company` is the FQDN of the Linkwarden installation. +- `authentik.company` is the FQDN of the authentik installation. ## Linkwarden configuration @@ -36,7 +36,7 @@ After making these changes, restart your Docker containers to apply the new conf ## authentik configuration -1. Access the **Admin Interface** in on your authentik install. +1. Access the **Admin Interface** in on your authentik installation. 2. Create a new **OAuth2 / OpenID Provider**. 3. Note the generated **Client ID** and **Client Secret**. 4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://linkwarden.company/api/v1/auth/callback/authentik` diff --git a/website/integrations/services/mastodon/index.md b/website/integrations/services/mastodon/index.md index 53c0100fa5af..c89dd30260e8 100644 --- a/website/integrations/services/mastodon/index.md +++ b/website/integrations/services/mastodon/index.md @@ -17,8 +17,8 @@ sidebar_label: Mastodon The following placeholders are used in this guide: -- `mastodon.company` is the FQDN of the mastodon install. -- `authentik.company` is the FQDN of the authentik install. +- `mastodon.company` is the FQDN of the mastodon installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik Configuration diff --git a/website/integrations/services/matrix-synapse/index.md b/website/integrations/services/matrix-synapse/index.md index 7a704f7a1439..d07ff8af7d57 100644 --- a/website/integrations/services/matrix-synapse/index.md +++ b/website/integrations/services/matrix-synapse/index.md @@ -17,8 +17,8 @@ sidebar_label: Matrix Synapse The following placeholders are used in this guide: -- `matrix.company` is the FQDN of the Matrix install. -- `authentik.company` is the FQDN of the authentik install. +- `matrix.company` is the FQDN of the Matrix installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: diff --git a/website/integrations/services/meshcentral/index.md b/website/integrations/services/meshcentral/index.md index bb66fa21cbdc..263d469e9641 100644 --- a/website/integrations/services/meshcentral/index.md +++ b/website/integrations/services/meshcentral/index.md @@ -15,8 +15,8 @@ sidebar_label: MeshCentral The following placeholders are used in this guide: -- `meshcentral.company` is the FQDN of the MeshCentral install. -- `authentik.company` is the FQDN of the authentik install. +- `meshcentral.company` is the FQDN of the MeshCentral installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/minio/index.md b/website/integrations/services/minio/index.md index c5158a06b365..2b4ab3c9a800 100644 --- a/website/integrations/services/minio/index.md +++ b/website/integrations/services/minio/index.md @@ -17,8 +17,8 @@ sidebar_label: MinIO The following placeholders are used in this guide: -- `minio.company` is the FQDN of the MinIO install. -- `authentik.company` is the FQDN of the authentik install. +- `minio.company` is the FQDN of the MinIO installation. +- `authentik.company` is the FQDN of the authentik installation. ### Mapping to MinIO policies diff --git a/website/integrations/services/mobilizon/index.md b/website/integrations/services/mobilizon/index.md index d00048d2752f..e57ce0f4b82a 100644 --- a/website/integrations/services/mobilizon/index.md +++ b/website/integrations/services/mobilizon/index.md @@ -17,8 +17,8 @@ sidebar_label: Mobilizon The following placeholders are used in this guide: -- `mobilizon.company` is the FQDN of the mobilizon install. -- `authentik.company` is the FQDN of the authentik install. +- `mobilizon.company` is the FQDN of the mobilizon installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik Configuration diff --git a/website/integrations/services/netbird/index.md b/website/integrations/services/netbird/index.md index 9ee2d745f2b0..687a8bbe3bc2 100644 --- a/website/integrations/services/netbird/index.md +++ b/website/integrations/services/netbird/index.md @@ -17,8 +17,8 @@ sidebar_label: NetBird The following placeholders are used in this guide: -- `netbird.company` is the FQDN of the NetBird install. -- `authentik.company` is the FQDN of the authentik install. +- `netbird.company` is the FQDN of the NetBird installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/netbox/index.md b/website/integrations/services/netbox/index.md index 4c11a516893e..789cb2f800af 100644 --- a/website/integrations/services/netbox/index.md +++ b/website/integrations/services/netbox/index.md @@ -17,8 +17,8 @@ sidebar_label: NetBox The following placeholders are used in this guide: -- `netbox.company` is the FQDN of the NetBox install. -- `authentik.company` is the FQDN of the authentik install. +- `netbox.company` is the FQDN of the NetBox installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _OAuth2/OpenID provider_ with the following parameters: diff --git a/website/integrations/services/nextcloud/index.md b/website/integrations/services/nextcloud/index.md index 1542ddd63b0b..e3f4aaccbb08 100644 --- a/website/integrations/services/nextcloud/index.md +++ b/website/integrations/services/nextcloud/index.md @@ -39,8 +39,8 @@ There are 3 ways to setup single sign on (SSO) for Nextcloud: The following placeholders are used in this guide: -- `nextcloud.company` is the FQDN of the Nextcloud install. -- `authentik.company` is the FQDN of the authentik install. +- `nextcloud.company` is the FQDN of the Nextcloud installation. +- `authentik.company` is the FQDN of the authentik installation. - `authentik.local` is the internal FQDN of the authentik install (only relevant when running authentik and Nextcloud behind a reverse proxy) Lets start by thinking what user attributes need to be available in Nextcloud: @@ -228,8 +228,8 @@ If you do not have any relying parties accessing authentik from the outside, you The following placeholders are used in this guide: -- `nextcloud.company` is the FQDN of the Nextcloud install. -- `authentik.company` is the FQDN of the authentik install. +- `nextcloud.company` is the FQDN of the Nextcloud installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _SAML provider_ with the following parameters: diff --git a/website/integrations/services/observium/index.md b/website/integrations/services/observium/index.md index e2b720537f8c..dd16f291df00 100644 --- a/website/integrations/services/observium/index.md +++ b/website/integrations/services/observium/index.md @@ -21,8 +21,8 @@ This is based on authentik 2024.6.0 and Observium CE 24.4.13528 The following placeholders are used in this guide: -- `observium.company` is the FQDN of the Observium install. -- `authentik.company` is the FQDN of the authentik install. +- `observium.company` is the FQDN of the Observium installation. +- `authentik.company` is the FQDN of the authentik installation. This guide assumes you already have a working Observium instance. It is recommended to install it with the install script, following the [instructions](https://docs.observium.org/) on Observium's website. diff --git a/website/integrations/services/organizr/index.md b/website/integrations/services/organizr/index.md index bad54e5b86cc..7471d4d80049 100644 --- a/website/integrations/services/organizr/index.md +++ b/website/integrations/services/organizr/index.md @@ -19,8 +19,8 @@ This integration leverages authentik's LDAP for the identity provider to achieve The following placeholders are used in this guide: -- `organizr.company` is the FQDN of the Service install. -- `authentik.company` is the FQDN of the authentik install. +- `organizr.company` is the FQDN of the Service installation. +- `authentik.company` is the FQDN of the authentik installation. Create a new user account _(or reuse an existing)_ for organizr to use for LDAP bind under _Directory_ -> _Users_ -> _Create_, in this example called `ldapservice`. diff --git a/website/integrations/services/outline/index.md b/website/integrations/services/outline/index.md index 364a773f7c6f..51b198e8a616 100644 --- a/website/integrations/services/outline/index.md +++ b/website/integrations/services/outline/index.md @@ -18,8 +18,8 @@ sidebar_label: Outline The following placeholders are used in this guide: -- `outline.company` is the FQDN of the Outline install. -- `authentik.company` is the FQDN of the authentik install. +- `outline.company` is the FQDN of the Outline installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/paperless-ng/index.md b/website/integrations/services/paperless-ng/index.md index 0bbe77ab3fbb..b04275f2370f 100644 --- a/website/integrations/services/paperless-ng/index.md +++ b/website/integrations/services/paperless-ng/index.md @@ -23,7 +23,7 @@ The author of Paperless-ng recommends you do not expose Paperless outside your n The following placeholders are used in this guide: -- `paperless.company` is the FQDN of the Paperless-ng install. +- `paperless.company` is the FQDN of the Paperless-ng installation. Also set up your proxy server to use forward auth with paperless.company: https://goauthentik.io/docs/providers/proxy/forward_auth diff --git a/website/integrations/services/paperless-ngx/index.mdx b/website/integrations/services/paperless-ngx/index.mdx index 6fbe9d8d26a9..8061fa07d609 100644 --- a/website/integrations/services/paperless-ngx/index.mdx +++ b/website/integrations/services/paperless-ngx/index.mdx @@ -17,8 +17,8 @@ sidebar_label: Paperless-ngx The following placeholders are used in this guide: -- `paperless.company` is the FQDN of the Paperless-ngx install. -- `authentik.company` is the FQDN of the authentik install. +- `paperless.company` is the FQDN of the Paperless-ngx installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik Configuration diff --git a/website/integrations/services/powerdns-admin/index.md b/website/integrations/services/powerdns-admin/index.md index 6b436a99cd8f..4946c3c987f4 100644 --- a/website/integrations/services/powerdns-admin/index.md +++ b/website/integrations/services/powerdns-admin/index.md @@ -17,8 +17,8 @@ sidebar_label: PowerDNS-Admin The following placeholders are used in this guide: -- `pdns-admin.company` is the FQDN of the PowerDNS-Admin install. -- `authentik.company` is the FQDN of the authentik install. +- `pdns-admin.company` is the FQDN of the PowerDNS-Admin installation. +- `authentik.company` is the FQDN of the authentik installation. Create a SAML provider with the following parameters: diff --git a/website/integrations/services/proftpd/index.md b/website/integrations/services/proftpd/index.md index 20ba23ee531f..9013499c8de8 100644 --- a/website/integrations/services/proftpd/index.md +++ b/website/integrations/services/proftpd/index.md @@ -19,7 +19,7 @@ This integration leverages authentik's LDAP for the identity provider to achieve The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## authentik Configuration diff --git a/website/integrations/services/proxmox-ve/index.md b/website/integrations/services/proxmox-ve/index.md index 6643275298bd..62e40a2213d9 100644 --- a/website/integrations/services/proxmox-ve/index.md +++ b/website/integrations/services/proxmox-ve/index.md @@ -22,7 +22,7 @@ Requires Proxmox VE 7.0 or newer. The following placeholders are used in this guide: - `proxmox.company` is the FQDN of the Proxmox VE server. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/rancher/index.md b/website/integrations/services/rancher/index.md index a87801f2fe0f..913a4b06a7fa 100644 --- a/website/integrations/services/rancher/index.md +++ b/website/integrations/services/rancher/index.md @@ -18,8 +18,8 @@ sidebar_label: Rancher The following placeholders are used in this guide: -- `rancher.company` is the FQDN of the Rancher install. -- `authentik.company` is the FQDN of the authentik install. +- `rancher.company` is the FQDN of the Rancher installation. +- `authentik.company` is the FQDN of the authentik installation. Under _Customization_ -> _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following diff --git a/website/integrations/services/roundcube/index.md b/website/integrations/services/roundcube/index.md index bcb5e376c18a..25afea4f81dc 100644 --- a/website/integrations/services/roundcube/index.md +++ b/website/integrations/services/roundcube/index.md @@ -21,7 +21,7 @@ The mail server must support XOAUTH2 for both SMTPD and IMAP/POP. Postfix SMTP s The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. Create a new oauth2 Scope Mapping which does not return the 'group' values and associate this mapping in the provider settings instead of the default oauth mapping. diff --git a/website/integrations/services/semaphore/index.mdx b/website/integrations/services/semaphore/index.mdx index 1b28b3075a2f..a347108ffbdd 100644 --- a/website/integrations/services/semaphore/index.mdx +++ b/website/integrations/services/semaphore/index.mdx @@ -19,8 +19,8 @@ sidebar_label: Semaphore The following placeholders are used in this guide: -- `semaphore.company` is the FQDN of the Semaphore install. -- `authentik.company` is the FQDN of the authentik install. +- `semaphore.company` is the FQDN of the Semaphore installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/semgrep/index.md b/website/integrations/services/semgrep/index.md index a798382e6926..84eb148e359c 100644 --- a/website/integrations/services/semgrep/index.md +++ b/website/integrations/services/semgrep/index.md @@ -17,7 +17,7 @@ sidebar_label: Semgrep The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. - `devcompany` is the organization name on Semgrep Cloud platform. ## authentik configuration diff --git a/website/integrations/services/sentry/index.md b/website/integrations/services/sentry/index.md index bea76f273945..2832af77477e 100644 --- a/website/integrations/services/sentry/index.md +++ b/website/integrations/services/sentry/index.md @@ -18,8 +18,8 @@ sidebar_label: Sentry The following placeholders are used in this guide: -- `sentry.company` is the FQDN of the Sentry install. -- `authentik.company` is the FQDN of the authentik install. +- `sentry.company` is the FQDN of the Sentry installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik. Create a SAML Provider with the following values diff --git a/website/integrations/services/skyhigh/index.md b/website/integrations/services/skyhigh/index.md index 44017ff9d8d5..88202d190775 100644 --- a/website/integrations/services/skyhigh/index.md +++ b/website/integrations/services/skyhigh/index.md @@ -22,7 +22,7 @@ Skyhigh has multiple points for SAML integration: The following placeholder will be used throughout this document. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## Integration for Dashboard Administrator login diff --git a/website/integrations/services/slack/index.md b/website/integrations/services/slack/index.md index 38b4a4ec0646..3410a8bf7766 100644 --- a/website/integrations/services/slack/index.md +++ b/website/integrations/services/slack/index.md @@ -16,7 +16,7 @@ sidebar_label: Slack The following placeholder will be used: - You can use slack.company> or my-workspace.slack.com as the FQDN of your Slack instance. -- You can use authentik.company as the FQDN of the authentik install. +- You can use authentik.company as the FQDN of the authentik installation. For additional information about integrating with Slack, refer to their [documentation](https://slack.com/help/articles/205168057-Custom-SAML-single-sign-on). diff --git a/website/integrations/services/snipe-it/index.md b/website/integrations/services/snipe-it/index.md index 738b9e309103..dc795b53c42f 100644 --- a/website/integrations/services/snipe-it/index.md +++ b/website/integrations/services/snipe-it/index.md @@ -26,8 +26,8 @@ built-in authentication. The following placeholders are used in this guide: -- `inventory.company` is the FQDN of the snipe-it install. -- `authentik.company` is the FQDN of the authentik install. +- `inventory.company` is the FQDN of the snipe-it installation. +- `authentik.company` is the FQDN of the authentik installation. - `snipeit-user` is the name of the authentik service account we will create. - `DC=ldap,DC=authentik,DC=io` is the Base DN of the LDAP Provider (default) diff --git a/website/integrations/services/sonar-qube/index.md b/website/integrations/services/sonar-qube/index.md index 3d8326022744..1e7a3af807f5 100644 --- a/website/integrations/services/sonar-qube/index.md +++ b/website/integrations/services/sonar-qube/index.md @@ -17,8 +17,8 @@ sidebar_label: SonarQube The following placeholders are used in this guide: -- `sonarqube.company` is the FQDN of the sonarqube install. -- `authentik.company` is the FQDN of the authentik install. +- `sonarqube.company` is the FQDN of the sonarqube installation. +- `authentik.company` is the FQDN of the authentik installation. ## Terraform provider diff --git a/website/integrations/services/sonarr/index.md b/website/integrations/services/sonarr/index.md index c921d51bad87..b781b943d9ea 100644 --- a/website/integrations/services/sonarr/index.md +++ b/website/integrations/services/sonarr/index.md @@ -21,8 +21,8 @@ These instructions apply to all projects in the \*arr Family. If you use multipl The following placeholders are used in this guide: -- `sonarr.company` is the FQDN of the Sonarr install. -- `authentik.company` is the FQDN of the authentik install. +- `sonarr.company` is the FQDN of the Sonarr installation. +- `authentik.company` is the FQDN of the authentik installation. Create a Proxy Provider with the following values diff --git a/website/integrations/services/sssd/index.md b/website/integrations/services/sssd/index.md index c9f115ccdff2..c318dc66ff4f 100644 --- a/website/integrations/services/sssd/index.md +++ b/website/integrations/services/sssd/index.md @@ -22,7 +22,7 @@ Kerberos is also not supported. The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. - `ldap.baseDN` is the Base DN you configure in the LDAP provider. - `ldap.domain` is (typically) an FQDN for your domain. Usually it is just the components of your base DN. For example, if diff --git a/website/integrations/services/synology-dsm/index.md b/website/integrations/services/synology-dsm/index.md index b6e339dcd92b..d9b7b0a3ed5b 100644 --- a/website/integrations/services/synology-dsm/index.md +++ b/website/integrations/services/synology-dsm/index.md @@ -22,7 +22,7 @@ This is tested with DSM 7.1 or newer. The following placeholders are used in this guide: - `synology.company` is the FQDN of the Synology DSM server. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/tautulli/index.md b/website/integrations/services/tautulli/index.md index e9eb769129df..3ccf14fe6ecf 100644 --- a/website/integrations/services/tautulli/index.md +++ b/website/integrations/services/tautulli/index.md @@ -17,8 +17,8 @@ sidebar_label: Tautulli The following placeholders are used in this guide: -- `tautulli.company` is the FQDN of the Tautulli install. -- `authentik.company` is the FQDN of the authentik install. +- `tautulli.company` is the FQDN of the Tautulli installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik Setup diff --git a/website/integrations/services/thelounge/index.md b/website/integrations/services/thelounge/index.md index bc4a5e72f2d2..a5d7492de21d 100644 --- a/website/integrations/services/thelounge/index.md +++ b/website/integrations/services/thelounge/index.md @@ -22,7 +22,7 @@ If you made any changes, e.g. using a different name for the user, make sure to The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. - `dc=company,dc=com` the Base DN of the LDAP outpost. If you followed the LDAP provider guide this is: `dc=goauthentik,dc=io` - `ldap_bind_user` the username of the desired LDAP Bind User. If you followed the LDAP provider guide this is: `ldapservice` diff --git a/website/integrations/services/truecommand/index.md b/website/integrations/services/truecommand/index.md index 3f86d0b3d664..a1539b04c9a9 100644 --- a/website/integrations/services/truecommand/index.md +++ b/website/integrations/services/truecommand/index.md @@ -21,8 +21,8 @@ This setup assumes you will be using HTTPS as TrueCommand generates ACS and Redi The following placeholders are used in this guide: -- `truecommand.company` is the FQDN of the snipe-it install. -- `authentik.company` is the FQDN of the authentik install. +- `truecommand.company` is the FQDN of the snipe-it installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik and use the slug for later as `truenas-truecommand`. diff --git a/website/integrations/services/ubuntu-landscape/index.md b/website/integrations/services/ubuntu-landscape/index.md index f2ece89379a2..ee3cc2218943 100644 --- a/website/integrations/services/ubuntu-landscape/index.md +++ b/website/integrations/services/ubuntu-landscape/index.md @@ -22,7 +22,7 @@ This requires authentik 0.10.3 or newer. The following placeholders are used in this guide: - `landscape.company` is the FQDN of the Landscape server. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. Landscape uses the OpenID-Connect Protocol for single-sign on. diff --git a/website/integrations/services/uptime-kuma/index.md b/website/integrations/services/uptime-kuma/index.md index 467a663c7a2f..a0045c1feadb 100644 --- a/website/integrations/services/uptime-kuma/index.md +++ b/website/integrations/services/uptime-kuma/index.md @@ -19,8 +19,8 @@ Uptime Kuma currently supports only a single user and no native SSO solution. To The following placeholders are used in this guide: -- `uptime-kuma.company` is the FQDN of the Uptime Kuma install. -- `authentik.company` is the FQDN of the authentik install. +- `uptime-kuma.company` is the FQDN of the Uptime Kuma installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik. Create a Proxy provider with the following parameters: diff --git a/website/integrations/services/veeam-enterprise-manager/index.md b/website/integrations/services/veeam-enterprise-manager/index.md index 92a49f16acdf..a9c0828e532c 100644 --- a/website/integrations/services/veeam-enterprise-manager/index.md +++ b/website/integrations/services/veeam-enterprise-manager/index.md @@ -17,8 +17,8 @@ sidebar_label: Veeam Enterprise Manager The following placeholders are used in this guide: -- `veeam.company` is the FQDN of the Veeam Enterprise Manager install. -- `authentik.company` is the FQDN of the authentik install. +- `veeam.company` is the FQDN of the Veeam Enterprise Manager installation. +- `authentik.company` is the FQDN of the authentik installation. You will need an existing group or multiple in authentik to assign roles in Veeam Enterprise Manager to. diff --git a/website/integrations/services/vmware-vcenter/index.md b/website/integrations/services/vmware-vcenter/index.md index e14f8c9e5edb..4d2b0cba9fee 100644 --- a/website/integrations/services/vmware-vcenter/index.md +++ b/website/integrations/services/vmware-vcenter/index.md @@ -20,7 +20,7 @@ Integration with authentik requires VMware vCenter 8.03 or newer. The following placeholders will be used in the examples below: - `vcenter.company` is the FQDN of the vCenter server. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/weblate/index.md b/website/integrations/services/weblate/index.md index 8b3adc377cb8..11210bdcf65f 100644 --- a/website/integrations/services/weblate/index.md +++ b/website/integrations/services/weblate/index.md @@ -17,8 +17,8 @@ sidebar_label: Weblate The following placeholders are used in this guide: -- `weblate.company` is the FQDN of the Weblate install. -- `authentik.company` is the FQDN of the authentik install. +- `weblate.company` is the FQDN of the Weblate installation. +- `authentik.company` is the FQDN of the authentik installation. - `weblate-slug` is the slug of the Weblate application Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: diff --git a/website/integrations/services/wekan/index.mdx b/website/integrations/services/wekan/index.mdx index 516c33a811f4..68740c1c317b 100644 --- a/website/integrations/services/wekan/index.mdx +++ b/website/integrations/services/wekan/index.mdx @@ -17,8 +17,8 @@ sidebar_label: Wekan The following placeholders are used in this guide: -- `wekan.company` is the FQDN of the wekan install. -- `authentik.company` is the FQDN of the authentik install. +- `wekan.company` is the FQDN of the wekan installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: diff --git a/website/integrations/services/whats-up-docker/index.md b/website/integrations/services/whats-up-docker/index.md index 33c22de5b1a1..0e355203f6f3 100644 --- a/website/integrations/services/whats-up-docker/index.md +++ b/website/integrations/services/whats-up-docker/index.md @@ -17,8 +17,8 @@ sidebar_label: What's Up Docker The following placeholders are used in this guide: -- `wud.company` is the FQDN of the WUD install. -- `authentik.company` is the FQDN of the authentik install. +- `wud.company` is the FQDN of the WUD installation. +- `authentik.company` is the FQDN of the authentik installation. ## WUD configuration @@ -35,7 +35,7 @@ After making these changes, restart your Docker containers to apply the new conf ## authentik configuration -1. Access the **Admin Interface** in on your authentik install. +1. Access the **Admin Interface** in on your authentik installation. 2. Create a new **OAuth2 / OpenID Provider**. 3. Note the generated **Client ID** and **Client Secret**. 4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://wud.company/auth/oidc/authentik/cb` diff --git a/website/integrations/services/writefreely/index.md b/website/integrations/services/writefreely/index.md index 9c55d5c1c944..1c6ffcb9d769 100644 --- a/website/integrations/services/writefreely/index.md +++ b/website/integrations/services/writefreely/index.md @@ -21,8 +21,8 @@ Currently it is not possible to connect writefreely to authentik without making The following placeholders are used in this guide: -- `writefreely.company` is the FQDN of the writefreely install. -- `authentik.company` is the FQDN of the authentik install. +- `writefreely.company` is the FQDN of the writefreely installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik Configuration diff --git a/website/integrations/services/xen-orchestra/index.md b/website/integrations/services/xen-orchestra/index.md index 40af47c158c5..11f30f8b5b3e 100644 --- a/website/integrations/services/xen-orchestra/index.md +++ b/website/integrations/services/xen-orchestra/index.md @@ -23,7 +23,7 @@ If you are using the Xen Orchestra Appliance, the OIDC Plugin should be present. The following placeholders are used in this guide: - `xenorchestra.company` is the FQDN of the Xen Orchestra instance. -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. ## authentik configuration diff --git a/website/integrations/services/zabbix/index.md b/website/integrations/services/zabbix/index.md index 7eec4d165cc7..befb1a687343 100644 --- a/website/integrations/services/zabbix/index.md +++ b/website/integrations/services/zabbix/index.md @@ -19,8 +19,8 @@ sidebar_label: Zabbix The following placeholders are used in this guide: -- `zabbix.company` is the FQDN of the Zabbix install. -- `authentik.company` is the FQDN of the authentik install. +- `zabbix.company` is the FQDN of the Zabbix installation. +- `authentik.company` is the FQDN of the authentik installation. Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: diff --git a/website/integrations/services/zammad/index.md b/website/integrations/services/zammad/index.md index b7a81dd91705..f484993a2f0a 100644 --- a/website/integrations/services/zammad/index.md +++ b/website/integrations/services/zammad/index.md @@ -18,8 +18,8 @@ sidebar_label: Zammad The following placeholders are used in this guide: -- `zammad.company` is the FQDN of the zammad install. -- `authentik.company` is the FQDN of the authentik install. +- `zammad.company` is the FQDN of the zammad installation. +- `authentik.company` is the FQDN of the authentik installation. ## authentik Configuration diff --git a/website/integrations/services/zulip/index.md b/website/integrations/services/zulip/index.md index a88f1889eac3..389e1ba302ef 100644 --- a/website/integrations/services/zulip/index.md +++ b/website/integrations/services/zulip/index.md @@ -18,7 +18,7 @@ sidebar_label: Zulip The following placeholders are used in this guide: -- `authentik.company` is the FQDN of the authentik install. +- `authentik.company` is the FQDN of the authentik installation. - `zulip.company` is the FQDN of the Zulip instance. Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: diff --git a/website/integrations/template/service.md b/website/integrations/template/service.md index ca034a53e505..7a622a12e3c0 100644 --- a/website/integrations/template/service.md +++ b/website/integrations/template/service.md @@ -17,8 +17,8 @@ sidebar_label: Service Name The following placeholders are used in this guide: -- `service.company` is the FQDN of the Service install. (Remove this for SaaS) -- `authentik.company` is the FQDN of the authentik install. +- `service.company` is the FQDN of the Service installation. (Remove this for SaaS) +- `authentik.company` is the FQDN of the authentik installation. ## Service configuration