From 85869f9c47e408147ff431876f2022bdbc700eae Mon Sep 17 00:00:00 2001 From: Dewi Roberts Date: Fri, 9 May 2025 11:21:30 +0100 Subject: [PATCH] Updated sidebar and started integration doc --- .../integrations/services/ironclad/index.mdx | 58 +++++++++++++++++++ website/sidebars/integrations.mjs | 1 + 2 files changed, 59 insertions(+) create mode 100644 website/integrations/services/ironclad/index.mdx diff --git a/website/integrations/services/ironclad/index.mdx b/website/integrations/services/ironclad/index.mdx new file mode 100644 index 0000000000..54c9882a27 --- /dev/null +++ b/website/integrations/services/ironclad/index.mdx @@ -0,0 +1,58 @@ +--- +title: Integrate with Ironclad +sidebar_label: Ironclad +support_level: community +--- + +## What is Ironclad + +> Ironclad gives business and legal teams an easy-to-use platform with AI-powered tools to handle every aspect of the contract lifecycle. +> +> -- https://ironcladapp.com/ + +## Preparation + +The following placeholders are used in this guide: + +- `authentik.company` is the FQDN of the authentik installation. + +:::note +This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. +::: + +## authentik configuration + +To support the integration of Ironclad with authentik, you need to create a property mapping, and an application/provider pair in authentik. + +### Create a property mapping + +First name, last name + +### Create an application and provider in authentik + +1. Log in to authentik as an admin, and open the authentik Admin interface. +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) + + - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. + - **Choose a Provider type**: select **SAML Provider** as the provider type. + - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. + - Temporarily set the **ACS URL** to `https://temp.temp` + - Set **Audience** to `https://ironcladapp.com` + - Under **Advanced protocol settings**, set an available signing certificate. + - **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page. + +3. Click **Submit** to save the new application and provider. + +## Ironclad configuration + +Insert Service configuration + +1. Write first step here... + +2. Continue with steps.... + +## Configuration verification + +Template sentence that you can typically use here: "To confirm that authentik is properly configured with ``, log out and log back in via authentik." + +If there are more specific validation methods for the Service (e.g., clicking a button), include these instructions for clarity. diff --git a/website/sidebars/integrations.mjs b/website/sidebars/integrations.mjs index 39a16afe12..ad6afea04e 100644 --- a/website/sidebars/integrations.mjs +++ b/website/sidebars/integrations.mjs @@ -138,6 +138,7 @@ const items = [ "services/karakeep/index", "services/home-assistant/index", "services/immich/index", + "services/ironclad/index", "services/jellyfin/index", "services/komga/index", "services/mealie/index",