website/integrations: fix typos, update language and styling (#14978)
* Typo and improved language * Changes "admin" to "administrator" and updates indentation * Updates miniflux to newer styling * Combines two notes at beginning of jellyfin doc into one * Replaces all "your application slug" with "application_slug" and replaces tags that are no longer in use * Replaces tags that are no longer in use * Updates immich indentation, application_slug and removes tags * Updated bookstack indentation, tags and application slug * Removes kbd and em tags, and updates the application slug * Gix metadata header in bookstack doc * Lint fix miniflux * ArgoCD indentation --------- Signed-off-by: Dewi Roberts <dewi@goauthentik.io>
This commit is contained in:
		| @ -45,13 +45,13 @@ To support the integration of BookStack with authentik, you need to create an ap | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
| - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
| - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
| - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|     - Note the **Client ID**, **Client Secret**, and **slug** values because they will be required later. | ||||
|     - Set a `Strict` redirect URI to <kbd>https://<em>bookstack.company</em>/oidc/callback/</kbd>. | ||||
|     - Select any available signing key. | ||||
| - **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page. | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|         - Note the **Client ID**, **Client Secret**, and **slug** values because they will be required later. | ||||
|         - Set a `Strict` redirect URI to `https://bookstack.company/oidc/callback/`. | ||||
|         - Select any available signing key. | ||||
|     - **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page. | ||||
|  | ||||
| 3. Click **Submit** to save the new application and provider. | ||||
|  | ||||
| @ -66,7 +66,7 @@ Once that's done, the next step is to update your `.env` file to include the fol | ||||
|     OIDC_DISPLAY_NAME_CLAIMS=name # Claim(s) for the user's display name. Can have multiple attributes listed, separated with a '|' in which case those values will be joined with a space. | ||||
|     OIDC_CLIENT_ID=<Client ID from authentik> | ||||
|     OIDC_CLIENT_SECRET=<Client Secret from authentik> | ||||
|     OIDC_ISSUER=https://authentik.company/application/o/<your-application-slug> | ||||
|     OIDC_ISSUER=https://authentik.company/application/o/<application_slug> | ||||
|     OIDC_ISSUER_DISCOVER=true | ||||
|     OIDC_END_SESSION_ENDPOINT=true | ||||
|     ``` | ||||
| @ -88,10 +88,10 @@ To support the integration of BookStack with authentik, you need to create an ap | ||||
| - **Choose a Provider type**: select **SAML Provider** as the provider type. | ||||
| - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|     - Note the **Client ID**, **Client Secret**, and **slug** values because they will be required later. | ||||
|     - Set the **ACS URL** to <kbd>https://<em>bookstack.company</em>/saml2/acs</kbd>. | ||||
|     - Set the **Issuer** to <kbd>https://<em>authentik.company</em></kbd>. | ||||
|     - Set the **ACS URL** to `https://bookstack.company/saml2/acs`. | ||||
|     - Set the **Issuer** to `https://authentik.company`. | ||||
|     - Set the **Service Provider Binding** to `Post`. | ||||
|     - Set the **Audience** to <kbd>https://<em>bookstack.company</em>/saml2/metadata</kbd>. | ||||
|     - Set the **Audience** to `https://bookstack.company/saml2/metadata`. | ||||
|     - Under **Advanced protocol settings**, set **Signing Certificate** to use any available certificate. | ||||
| - **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page. | ||||
|  | ||||
| @ -99,8 +99,11 @@ To support the integration of BookStack with authentik, you need to create an ap | ||||
|  | ||||
| ### Obtain the SAML metadata URL | ||||
|  | ||||
| 1. In the authentik Admin Interface, nagiate to **Applications** > **Providers** and click on the provider tied to the application/provider pair created in the previous step. | ||||
| 2. Under the **Related objects** section, click **Copy download URL**. Take note of this value as you will need it later. | ||||
| ### Get metadata URL | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Providers** and click on the name of the provider that you created in the previous section (e.g. `Provider for bookstack`). | ||||
| 3. Under **Related objects** > **Metadata**, click on **Copy download URL**. This is your authentik metadata URL and it will be required in the next section. | ||||
|  | ||||
| ## Bookstack configuration | ||||
|  | ||||
| @ -115,7 +118,7 @@ Once that's done, the next step is to update your `.env` file to include the fol | ||||
|     SAML2_USER_TO_GROUPS=true | ||||
|     SAML2_GROUP_ATTRIBUTE=http://schemas.xmlsoap.org/claims/Group | ||||
|     SAML2_DISPLAY_NAME_ATTRIBUTES=http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname | ||||
|     SAML2_IDP_ENTITYID=https://authentik.company/api/v3/providers/saml/<your-application-slug>/metadata/?download | ||||
|     SAML2_IDP_ENTITYID=<authentik metadata URL> | ||||
|     SAML2_AUTOLOAD_METADATA=true | ||||
|     ``` | ||||
|  | ||||
|  | ||||
		Reference in New Issue
	
	Block a user
	 Dewi Roberts
					Dewi Roberts