web: spell customization with a Z (#8596) Co-authored-by: Fletcher Heisler <fheisler@users.noreply.github.com> Co-authored-by: Fletcher Heisler <fletcher@goauthentik.io>
This commit is contained in:
committed by
GitHub
parent
874d7ff320
commit
b6e961b1f3
@ -53,7 +53,7 @@ authentik already provides some default _scopes_ with _claims_ inside them, such
|
||||
|
||||
If you do not need storage quota or group information in Nextcloud [skip to the next step](#provider-and-application).
|
||||
|
||||
However, if you want to be able to control how much storage users in Nextcloud can use, as well as which users are recognized as Nextcloud administrators, you would need to make this information available in Nextcloud. To achieve this you would need to create a custom `profile` scope. To do so, go to _Customisation_ -> _Property mappings_. Create a _Scope mapping_ with the following parameters:
|
||||
However, if you want to be able to control how much storage users in Nextcloud can use, as well as which users are recognized as Nextcloud administrators, you would need to make this information available in Nextcloud. To achieve this you would need to create a custom `profile` scope. To do so, go to _Customization_ -> _Property mappings_. Create a _Scope mapping_ with the following parameters:
|
||||
|
||||
- Name: Nextcloud Profile
|
||||
- Scope name: profile
|
||||
|
||||
@ -79,7 +79,7 @@ Additional information from Microsoft documentation:
|
||||
|
||||
From the authentik Admin Dashboard:
|
||||
|
||||
1. Open **Customisation > Property Mappings** page from the sidebar.
|
||||
1. Open **Customization > Property Mappings** page from the sidebar.
|
||||
2. Click **Create** from the property mapping list command bar.
|
||||
3. Within the new property mapping form, select **Scope Mapping**.
|
||||
4. Click **Next** and enter the following values:
|
||||
@ -102,7 +102,7 @@ return {
|
||||
|
||||
From the authentik Admin Dashboard:
|
||||
|
||||
1. Open **Customisation > Property Mappings** page from the sidebar.
|
||||
1. Open **Customization > Property Mappings** page from the sidebar.
|
||||
2. Click **Create** from the property mapping list command bar.
|
||||
3. Within the new property mapping form, select **Scope Mapping**.
|
||||
4. Click **Next** and enter the following values:
|
||||
|
||||
@ -115,7 +115,7 @@ You must sync your LDAP database with Snipe-IT. Go to People on the sidebar menu
|
||||
|
||||
## authentik Property Mapping
|
||||
|
||||
To create a policy mapping, go to _Customisation/Property Mappings_, click `Create` then `LDAP Property Mapping`. Name is 'sn' and set Object field to sn:
|
||||
To create a policy mapping, go to _Customization/Property Mappings_, click `Create` then `LDAP Property Mapping`. Name is 'sn' and set Object field to sn:
|
||||
|
||||
```ini
|
||||
def getLastName():
|
||||
|
||||
@ -36,7 +36,7 @@ Under _Advanced protocol settings_, set NameID Property to _authentik default SA
|
||||
|
||||
The following custom property mappings are required.
|
||||
|
||||
Under _Customisation_, select _Property Mappings_, then _Create_. Select _SAML Property Mapping_.
|
||||
Under _Customization_, select _Property Mappings_, then _Create_. Select _SAML Property Mapping_.
|
||||
|
||||
### Username
|
||||
|
||||
|
||||
@ -22,7 +22,7 @@ The following placeholders will be used:
|
||||
|
||||
### Step 1 - Property Mappings
|
||||
|
||||
Create two Mappings (under _Customisation/Property Mappings_) with these settings:
|
||||
Create two Mappings (under _Customization/Property Mappings_) with these settings:
|
||||
|
||||
#### name mapping
|
||||
|
||||
|
||||
Reference in New Issue
Block a user