website: Bump prettier from 3.3.3 to 3.4.1 in /website (#12205)
* website: Bump prettier from 3.3.3 to 3.4.1 in /website Bumps [prettier](https://github.com/prettier/prettier) from 3.3.3 to 3.4.1. - [Release notes](https://github.com/prettier/prettier/releases) - [Changelog](https://github.com/prettier/prettier/blob/main/CHANGELOG.md) - [Commits](https://github.com/prettier/prettier/compare/3.3.3...3.4.1) --- updated-dependencies: - dependency-name: prettier dependency-type: direct:development update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> * update formatting Signed-off-by: Jens Langhammer <jens@goauthentik.io> * sigh Signed-off-by: Jens Langhammer <jens@goauthentik.io> * disable flaky test Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Jens Langhammer <jens@goauthentik.io> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
@ -17,12 +17,12 @@ sidebar_label: Skyhigh Security
|
||||
|
||||
Skyhigh has multiple points for SAML integration:
|
||||
|
||||
- Dashboard Administrator login - Allows you to manage the Skyhigh Security dashboard
|
||||
- Web Gateway and Private access - Authenticates for Internet access and ZTNA/Private access
|
||||
- Dashboard Administrator login - Allows you to manage the Skyhigh Security dashboard
|
||||
- Web Gateway and Private access - Authenticates for Internet access and ZTNA/Private access
|
||||
|
||||
The following placeholder will be used throughout this document.
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
|
||||
## Integration for Dashboard Administrator login
|
||||
|
||||
@ -32,11 +32,11 @@ While logged in to your Skyhigh Security Dashboard, click the configuration gear
|
||||
|
||||
Under the `Identity Provider` section enter the following values (replace `<slug>` with the name of the application slug you will use):
|
||||
|
||||
- Issuer: `https://authentik.company/skyhigh-dashboard`
|
||||
- Certificate: Upload the signing certificate you will use for the Authentik provider
|
||||
- Login URL: `https://authentik.company/application/saml/<slug>/sso/binding/init/`
|
||||
- SP-Initiated Request Binding: HTTP-POST
|
||||
- User exclusions: Select at least one administrator account to login directly (in case something goes wrong with SAML)
|
||||
- Issuer: `https://authentik.company/skyhigh-dashboard`
|
||||
- Certificate: Upload the signing certificate you will use for the Authentik provider
|
||||
- Login URL: `https://authentik.company/application/saml/<slug>/sso/binding/init/`
|
||||
- SP-Initiated Request Binding: HTTP-POST
|
||||
- User exclusions: Select at least one administrator account to login directly (in case something goes wrong with SAML)
|
||||
|
||||
Press `Save`
|
||||
|
||||
@ -46,13 +46,13 @@ Note the Audience and ACS URLs that appear. You will use these to configure Auth
|
||||
|
||||
In the Authentik admin Interface, navigate to `Applications` -> `Providers`. Create a SAML provider with the following parameters:
|
||||
|
||||
- ACS URL: Enter the ACS URL provided by the Skyhigh Dashboard above
|
||||
- Issuer: `https://authentik.company/skyhigh-dashboard`
|
||||
- Service Provider Binding: `Post`
|
||||
- Audience: Enter the Audience URL provided by the Skyhigh Dashboard above
|
||||
- Signing certificate: Select the certificate you uploaded to Skyhigh above
|
||||
- Property mappings: Select all default mappings.
|
||||
- NameID Property Mapping: `Authentik default SAML Mapping: Email`
|
||||
- ACS URL: Enter the ACS URL provided by the Skyhigh Dashboard above
|
||||
- Issuer: `https://authentik.company/skyhigh-dashboard`
|
||||
- Service Provider Binding: `Post`
|
||||
- Audience: Enter the Audience URL provided by the Skyhigh Dashboard above
|
||||
- Signing certificate: Select the certificate you uploaded to Skyhigh above
|
||||
- Property mappings: Select all default mappings.
|
||||
- NameID Property Mapping: `Authentik default SAML Mapping: Email`
|
||||
|
||||
Create an application linked to this new provider and use the slug name you used in the Skyhigh section above.
|
||||
|
||||
@ -62,12 +62,12 @@ Create an application linked to this new provider and use the slug name you used
|
||||
|
||||
In the Authentik admin Interface, navigate to `Applications` -> `Providers`. Create a SAML provider with the following parameters:
|
||||
|
||||
- ACS URL: `https://login.auth.ui.trellix.com/sso/saml2`
|
||||
- Issuer: `https://authentik.company/skyhigh-swg`
|
||||
- Service Provider Binding: `Post`
|
||||
- Audience: `https://login.auth.ui.trellix.com/sso/saml2`
|
||||
- Signing certificate: Select any certificate
|
||||
- Property mappings: Select all default mappings.
|
||||
- ACS URL: `https://login.auth.ui.trellix.com/sso/saml2`
|
||||
- Issuer: `https://authentik.company/skyhigh-swg`
|
||||
- Service Provider Binding: `Post`
|
||||
- Audience: `https://login.auth.ui.trellix.com/sso/saml2`
|
||||
- Signing certificate: Select any certificate
|
||||
- Property mappings: Select all default mappings.
|
||||
|
||||
Create an application linked to this new provider and note the name of its slug.
|
||||
|
||||
@ -79,14 +79,14 @@ Under the `Setup SAML` section click the `New SAML` button.
|
||||
|
||||
Configure your SAML provider as follows (replace `<slug>` with the name of your slug):
|
||||
|
||||
- SAML Configuration Name: Enter a descriptive name here
|
||||
- Service Provider Entity ID: `https://login.auth.ui.trellix.com/sso/saml2`
|
||||
- SAML Identity Provider URL: `https://authentik.company/application/saml/<slug>/sso/binding/post/`
|
||||
- Identity Provider Entity ID: `https://authentik.company/skyhigh-swg`
|
||||
- User ID Attribute in SAML Response: `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress`
|
||||
- Group ID Attribute in SAML Response: `http://schemas.xmlsoap.org/claims/Group`
|
||||
- Identity Provider Certificate: Upload the certificate you selected in the Authentik SAML provider you created earlier
|
||||
- Domain(s): Enter the email domain(s) you wish to redirect for authentication to Authentik
|
||||
- SAML Configuration Name: Enter a descriptive name here
|
||||
- Service Provider Entity ID: `https://login.auth.ui.trellix.com/sso/saml2`
|
||||
- SAML Identity Provider URL: `https://authentik.company/application/saml/<slug>/sso/binding/post/`
|
||||
- Identity Provider Entity ID: `https://authentik.company/skyhigh-swg`
|
||||
- User ID Attribute in SAML Response: `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress`
|
||||
- Group ID Attribute in SAML Response: `http://schemas.xmlsoap.org/claims/Group`
|
||||
- Identity Provider Certificate: Upload the certificate you selected in the Authentik SAML provider you created earlier
|
||||
- Domain(s): Enter the email domain(s) you wish to redirect for authentication to Authentik
|
||||
|
||||
Save your changes and publish the web policy.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user