web: spell customization with a Z (cherry-pick #8596) (#8602)

web: spell customization with a Z (#8596)

Co-authored-by: Fletcher Heisler <fheisler@users.noreply.github.com>
Co-authored-by: Fletcher Heisler <fletcher@goauthentik.io>
This commit is contained in:
gcp-cherry-pick-bot[bot]
2024-02-21 15:00:54 +01:00
committed by GitHub
parent 874d7ff320
commit b6e961b1f3
22 changed files with 25 additions and 25 deletions

View File

@ -53,7 +53,7 @@ authentik already provides some default _scopes_ with _claims_ inside them, such
If you do not need storage quota or group information in Nextcloud [skip to the next step](#provider-and-application).
However, if you want to be able to control how much storage users in Nextcloud can use, as well as which users are recognized as Nextcloud administrators, you would need to make this information available in Nextcloud. To achieve this you would need to create a custom `profile` scope. To do so, go to _Customisation_ -> _Property mappings_. Create a _Scope mapping_ with the following parameters:
However, if you want to be able to control how much storage users in Nextcloud can use, as well as which users are recognized as Nextcloud administrators, you would need to make this information available in Nextcloud. To achieve this you would need to create a custom `profile` scope. To do so, go to _Customization_ -> _Property mappings_. Create a _Scope mapping_ with the following parameters:
- Name: Nextcloud Profile
- Scope name: profile

View File

@ -79,7 +79,7 @@ Additional information from Microsoft documentation:
From the authentik Admin Dashboard:
1. Open **Customisation > Property Mappings** page from the sidebar.
1. Open **Customization > Property Mappings** page from the sidebar.
2. Click **Create** from the property mapping list command bar.
3. Within the new property mapping form, select **Scope Mapping**.
4. Click **Next** and enter the following values:
@ -102,7 +102,7 @@ return {
From the authentik Admin Dashboard:
1. Open **Customisation > Property Mappings** page from the sidebar.
1. Open **Customization > Property Mappings** page from the sidebar.
2. Click **Create** from the property mapping list command bar.
3. Within the new property mapping form, select **Scope Mapping**.
4. Click **Next** and enter the following values:

View File

@ -115,7 +115,7 @@ You must sync your LDAP database with Snipe-IT. Go to People on the sidebar menu
## authentik Property Mapping
To create a policy mapping, go to _Customisation/Property Mappings_, click `Create` then `LDAP Property Mapping`. Name is 'sn' and set Object field to sn:
To create a policy mapping, go to _Customization/Property Mappings_, click `Create` then `LDAP Property Mapping`. Name is 'sn' and set Object field to sn:
```ini
def getLastName():

View File

@ -36,7 +36,7 @@ Under _Advanced protocol settings_, set NameID Property to _authentik default SA
The following custom property mappings are required.
Under _Customisation_, select _Property Mappings_, then _Create_. Select _SAML Property Mapping_.
Under _Customization_, select _Property Mappings_, then _Create_. Select _SAML Property Mapping_.
### Username

View File

@ -22,7 +22,7 @@ The following placeholders will be used:
### Step 1 - Property Mappings
Create two Mappings (under _Customisation/Property Mappings_) with these settings:
Create two Mappings (under _Customization/Property Mappings_) with these settings:
#### name mapping