From deef365ff5d7b7f9e491a909cda36c50c7b3ea9e Mon Sep 17 00:00:00 2001 From: Dominic R Date: Tue, 1 Apr 2025 12:51:31 -0400 Subject: [PATCH] website/integrations-all: update authentik configuration template (#13740) --- website/integrations/services/actual-budget/index.mdx | 2 +- website/integrations/services/adventurelog/index.md | 2 +- website/integrations/services/apache-guacamole/index.mdx | 2 +- website/integrations/services/argocd/index.md | 2 +- website/integrations/services/aruba-orchestrator/index.md | 2 +- website/integrations/services/aws/index.mdx | 4 ++-- website/integrations/services/awx-tower/index.md | 2 +- website/integrations/services/beszel/index.mdx | 2 +- website/integrations/services/bookstack/index.md | 2 +- website/integrations/services/budibase/index.md | 2 +- website/integrations/services/chronograf/index.md | 2 +- website/integrations/services/cloudflare-access/index.md | 2 +- website/integrations/services/dokuwiki/index.md | 2 +- website/integrations/services/drupal/index.md | 2 +- website/integrations/services/engomo/index.mdx | 2 +- website/integrations/services/espoCRM/index.md | 2 +- website/integrations/services/firezone/index.md | 2 +- website/integrations/services/fortigate-admin/index.md | 2 +- website/integrations/services/fortimanager/index.md | 2 +- website/integrations/services/frappe/index.md | 2 +- website/integrations/services/freshrss/index.md | 2 +- website/integrations/services/gatus/index.md | 2 +- website/integrations/services/gitea/index.md | 2 +- .../integrations/services/github-enterprise-cloud/index.md | 2 +- website/integrations/services/github-enterprise-emu/index.md | 2 +- .../integrations/services/github-enterprise-server/index.md | 2 +- website/integrations/services/github-organization/index.md | 2 +- website/integrations/services/gitlab/index.mdx | 2 +- website/integrations/services/glitchtip/index.md | 2 +- website/integrations/services/globalprotect/index.md | 2 +- website/integrations/services/grafana/index.mdx | 2 +- website/integrations/services/gravitee/index.md | 2 +- website/integrations/services/gravity/index.md | 2 +- website/integrations/services/harbor/index.md | 2 +- website/integrations/services/hashicorp-vault/index.md | 2 +- website/integrations/services/hedgedoc/index.md | 2 +- website/integrations/services/hoarder/index.md | 2 +- website/integrations/services/immich/index.md | 2 +- website/integrations/services/jenkins/index.md | 2 +- website/integrations/services/kimai/index.md | 2 +- website/integrations/services/komga/index.md | 2 +- website/integrations/services/linkwarden/index.md | 2 +- website/integrations/services/mastodon/index.md | 2 +- website/integrations/services/matrix-synapse/index.md | 2 +- website/integrations/services/mautic/index.md | 2 +- website/integrations/services/meshcentral/index.md | 2 +- website/integrations/services/miniflux/index.md | 2 +- website/integrations/services/minio/index.md | 2 +- website/integrations/services/mobilizon/index.md | 2 +- website/integrations/services/netbird/index.md | 2 +- website/integrations/services/netbox/index.md | 2 +- website/integrations/services/node-red/index.md | 2 +- website/integrations/services/observium/index.md | 2 +- website/integrations/services/open-webui/index.md | 2 +- website/integrations/services/oracle-cloud/index.md | 2 +- website/integrations/services/outline/index.md | 2 +- website/integrations/services/owncloud/index.md | 2 +- website/integrations/services/paperless-ngx/index.mdx | 2 +- website/integrations/services/pgadmin/index.md | 2 +- website/integrations/services/plesk/index.md | 2 +- website/integrations/services/portainer/index.md | 2 +- website/integrations/services/proxmox-ve/index.md | 2 +- website/integrations/services/rocketchat/index.md | 2 +- website/integrations/services/roundcube/index.md | 2 +- website/integrations/services/rustdesk-pro/index.mdx | 2 +- website/integrations/services/semaphore/index.mdx | 2 +- website/integrations/services/synology-dsm/index.md | 2 +- website/integrations/services/tandoor/index.md | 2 +- website/integrations/services/terrakube/index.md | 2 +- website/integrations/services/truecommand/index.md | 2 +- website/integrations/services/ubuntu-landscape/index.md | 2 +- website/integrations/services/uptime-kuma/index.md | 2 +- website/integrations/services/vikunja/index.md | 2 +- website/integrations/services/vmware-vcenter/index.md | 2 +- website/integrations/services/weblate/index.md | 2 +- website/integrations/services/wekan/index.mdx | 2 +- website/integrations/services/whats-up-docker/index.md | 2 +- website/integrations/services/wiki-js/index.md | 2 +- website/integrations/services/wordpress/index.md | 2 +- website/integrations/services/writefreely/index.md | 2 +- website/integrations/services/xen-orchestra/index.md | 2 +- website/integrations/services/zabbix/index.md | 2 +- website/integrations/services/zammad/index.md | 2 +- website/integrations/services/zipline/index.md | 2 +- website/integrations/services/zulip/index.md | 2 +- website/integrations/template/service.md | 2 +- 86 files changed, 87 insertions(+), 87 deletions(-) diff --git a/website/integrations/services/actual-budget/index.mdx b/website/integrations/services/actual-budget/index.mdx index 1a3408fca6..41e36be883 100644 --- a/website/integrations/services/actual-budget/index.mdx +++ b/website/integrations/services/actual-budget/index.mdx @@ -31,7 +31,7 @@ To support the integration of Actual Budget with authentik, you need to create a ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/adventurelog/index.md b/website/integrations/services/adventurelog/index.md index 7f88e52b03..071f0d712d 100644 --- a/website/integrations/services/adventurelog/index.md +++ b/website/integrations/services/adventurelog/index.md @@ -28,7 +28,7 @@ To support the integration of Adventure Log with authentik, you need to create a ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/apache-guacamole/index.mdx b/website/integrations/services/apache-guacamole/index.mdx index fa00bc23a8..6a60fee69e 100644 --- a/website/integrations/services/apache-guacamole/index.mdx +++ b/website/integrations/services/apache-guacamole/index.mdx @@ -28,7 +28,7 @@ To support the integration of Apache Guacamole with authentik, you need to creat ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/argocd/index.md b/website/integrations/services/argocd/index.md index df3b7110f6..5521e2e79a 100644 --- a/website/integrations/services/argocd/index.md +++ b/website/integrations/services/argocd/index.md @@ -28,7 +28,7 @@ To support the integration of ArgoCD with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/aruba-orchestrator/index.md b/website/integrations/services/aruba-orchestrator/index.md index 384ee85b72..b9ad767343 100644 --- a/website/integrations/services/aruba-orchestrator/index.md +++ b/website/integrations/services/aruba-orchestrator/index.md @@ -43,7 +43,7 @@ To support the integration of Aruba Orchestrator with authentik, you need to cre ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/aws/index.mdx b/website/integrations/services/aws/index.mdx index e1c82106de..14a91d8fa9 100644 --- a/website/integrations/services/aws/index.mdx +++ b/website/integrations/services/aws/index.mdx @@ -80,7 +80,7 @@ To support the integration of AWS with authentik using the classic IAM method, y #### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name (e.g. "AWS"), an optional group for the type of application, the policy engine mode, and optional UI settings. The **slug** will be used in URLs and should match the `aws-slug` placeholder defined earlier. - **Choose a Provider type**: select **SAML Provider** as the provider type. @@ -121,7 +121,7 @@ To support the integration of AWS with authentik using IAM Identity Center, you #### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name (e.g. "AWS Identity Center"), an optional group for the type of application, the policy engine mode, and optional UI settings. The **slug** will be used in URLs and should match the `aws-slug` placeholder defined earlier. - **Choose a Provider type**: select **SAML Provider from metadata** as the provider type. diff --git a/website/integrations/services/awx-tower/index.md b/website/integrations/services/awx-tower/index.md index be5b0c5a99..f254a8c00e 100644 --- a/website/integrations/services/awx-tower/index.md +++ b/website/integrations/services/awx-tower/index.md @@ -32,7 +32,7 @@ To support the integration of AWX Tower with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx index ea2a1ce21f..7e69fa70a5 100644 --- a/website/integrations/services/beszel/index.mdx +++ b/website/integrations/services/beszel/index.mdx @@ -33,7 +33,7 @@ This documentation lists only the settings that you need to change from their de The steps to configure authentik include creating an application and provider pair in authentik, obtaining the Client ID, Client Secret, and slug values, setting the redirect URI, and selecting a signing key. 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name (`Beszel`), a slug (`beszel`), an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: OAuth2/OpenID diff --git a/website/integrations/services/bookstack/index.md b/website/integrations/services/bookstack/index.md index 52f77e46f4..7ca5edc53b 100644 --- a/website/integrations/services/bookstack/index.md +++ b/website/integrations/services/bookstack/index.md @@ -33,7 +33,7 @@ To support the integration of BookStack with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/budibase/index.md b/website/integrations/services/budibase/index.md index 017e5c1fa7..2423c2fc7e 100644 --- a/website/integrations/services/budibase/index.md +++ b/website/integrations/services/budibase/index.md @@ -28,7 +28,7 @@ To support the integration of Budibase with authentik, you need to create an app ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/chronograf/index.md b/website/integrations/services/chronograf/index.md index dd9ca2f0bd..7b52ae5efe 100644 --- a/website/integrations/services/chronograf/index.md +++ b/website/integrations/services/chronograf/index.md @@ -28,7 +28,7 @@ To support the integration of Chronograf with authentik, you need to create an a ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) 3. Log in to authentik as an admin, and open the authentik Admin interface. 4. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) diff --git a/website/integrations/services/cloudflare-access/index.md b/website/integrations/services/cloudflare-access/index.md index 9b11eef5ab..fc49e11ae6 100644 --- a/website/integrations/services/cloudflare-access/index.md +++ b/website/integrations/services/cloudflare-access/index.md @@ -30,7 +30,7 @@ To support the integration of Cloudflare Access with authentik, you need to crea ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/dokuwiki/index.md b/website/integrations/services/dokuwiki/index.md index 9345f54d4a..55c2e7943d 100644 --- a/website/integrations/services/dokuwiki/index.md +++ b/website/integrations/services/dokuwiki/index.md @@ -28,7 +28,7 @@ To support the integration of DocuWiki with authentik, you need to create an app ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/drupal/index.md b/website/integrations/services/drupal/index.md index 4b9b8e44f1..4cb135db65 100644 --- a/website/integrations/services/drupal/index.md +++ b/website/integrations/services/drupal/index.md @@ -33,7 +33,7 @@ To support the integration of Drupal with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. The **slug** will be used in URLs and should match the `drupal-slug` placeholder defined earlier. - **Choose a Provider type**: select **OAuth2/OpenID Provider** as the provider type. diff --git a/website/integrations/services/engomo/index.mdx b/website/integrations/services/engomo/index.mdx index b73d862dea..670f02754e 100644 --- a/website/integrations/services/engomo/index.mdx +++ b/website/integrations/services/engomo/index.mdx @@ -39,7 +39,7 @@ To support the integration of Engomo with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/espoCRM/index.md b/website/integrations/services/espoCRM/index.md index 5c0685cfe3..fa988f01ee 100644 --- a/website/integrations/services/espoCRM/index.md +++ b/website/integrations/services/espoCRM/index.md @@ -33,7 +33,7 @@ To support the integration of EspoCRM with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/firezone/index.md b/website/integrations/services/firezone/index.md index 7d1290b7fa..3708e8293c 100644 --- a/website/integrations/services/firezone/index.md +++ b/website/integrations/services/firezone/index.md @@ -29,7 +29,7 @@ To support the integration of Firezone with authentik, you need to create an app ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/fortigate-admin/index.md b/website/integrations/services/fortigate-admin/index.md index 18d5f86ca1..606183b9f7 100644 --- a/website/integrations/services/fortigate-admin/index.md +++ b/website/integrations/services/fortigate-admin/index.md @@ -39,7 +39,7 @@ To support the integration of FortiGate with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/fortimanager/index.md b/website/integrations/services/fortimanager/index.md index 6bbffa655a..569f269603 100644 --- a/website/integrations/services/fortimanager/index.md +++ b/website/integrations/services/fortimanager/index.md @@ -30,7 +30,7 @@ To support the integration of FortiManager with authentik, you need to create an ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/frappe/index.md b/website/integrations/services/frappe/index.md index 2fd2660045..5efd2af702 100644 --- a/website/integrations/services/frappe/index.md +++ b/website/integrations/services/frappe/index.md @@ -33,7 +33,7 @@ To support the integration of Frappe with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/freshrss/index.md b/website/integrations/services/freshrss/index.md index 5797b0c250..f7597832bf 100644 --- a/website/integrations/services/freshrss/index.md +++ b/website/integrations/services/freshrss/index.md @@ -29,7 +29,7 @@ To support the integration of FreshRss with authentik, you need to create an app ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/gatus/index.md b/website/integrations/services/gatus/index.md index 661047740d..37457fac01 100644 --- a/website/integrations/services/gatus/index.md +++ b/website/integrations/services/gatus/index.md @@ -28,7 +28,7 @@ To support the integration of Gatus with authentik, you need to create an applic ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/gitea/index.md b/website/integrations/services/gitea/index.md index f54c64d484..ac1d870b00 100644 --- a/website/integrations/services/gitea/index.md +++ b/website/integrations/services/gitea/index.md @@ -32,7 +32,7 @@ To support the integration of Gitea with authentik, you need to create an applic ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/github-enterprise-cloud/index.md b/website/integrations/services/github-enterprise-cloud/index.md index 151e1cce8d..1c5af7f1a5 100644 --- a/website/integrations/services/github-enterprise-cloud/index.md +++ b/website/integrations/services/github-enterprise-cloud/index.md @@ -32,7 +32,7 @@ To support the integration of GitHub Enterprise Cloud with authentik, you need t ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/github-enterprise-emu/index.md b/website/integrations/services/github-enterprise-emu/index.md index 795efe563d..51685904d0 100644 --- a/website/integrations/services/github-enterprise-emu/index.md +++ b/website/integrations/services/github-enterprise-emu/index.md @@ -44,7 +44,7 @@ GitHub will create usenames for your EMU users based on the SAML `NameID` proper ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/github-enterprise-server/index.md b/website/integrations/services/github-enterprise-server/index.md index 5fea9dd285..d89300c8c2 100644 --- a/website/integrations/services/github-enterprise-server/index.md +++ b/website/integrations/services/github-enterprise-server/index.md @@ -34,7 +34,7 @@ In order to use GitHub Enterprise Server, SCIM must also be set up. ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/github-organization/index.md b/website/integrations/services/github-organization/index.md index 47dc237174..bcbe6efb97 100644 --- a/website/integrations/services/github-organization/index.md +++ b/website/integrations/services/github-organization/index.md @@ -28,7 +28,7 @@ To support the integration of AWX Tower with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/gitlab/index.mdx b/website/integrations/services/gitlab/index.mdx index a1f02ce7f0..6b3fffbab6 100644 --- a/website/integrations/services/gitlab/index.mdx +++ b/website/integrations/services/gitlab/index.mdx @@ -105,7 +105,7 @@ To support the integration of GitLab with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/glitchtip/index.md b/website/integrations/services/glitchtip/index.md index e5958173f6..f6c6ab8182 100644 --- a/website/integrations/services/glitchtip/index.md +++ b/website/integrations/services/glitchtip/index.md @@ -28,7 +28,7 @@ To support the integration of Glitchtip with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/globalprotect/index.md b/website/integrations/services/globalprotect/index.md index fe34522384..72659bf354 100644 --- a/website/integrations/services/globalprotect/index.md +++ b/website/integrations/services/globalprotect/index.md @@ -34,7 +34,7 @@ To support the integration of GlobalProtect with authentik, you need to create a ### Create an Application and Provider in authentik 1. Log in to authentik as an admin and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider**. +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: Provide a descriptive name, an optional group, and UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: Select **SAML Provider**. - **Configure the Provider**: diff --git a/website/integrations/services/grafana/index.mdx b/website/integrations/services/grafana/index.mdx index 4f28dd9bca..fe2060ccfb 100644 --- a/website/integrations/services/grafana/index.mdx +++ b/website/integrations/services/grafana/index.mdx @@ -28,7 +28,7 @@ To support the integration of Grafana with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/gravitee/index.md b/website/integrations/services/gravitee/index.md index 42e9c4471c..39cbe2273a 100644 --- a/website/integrations/services/gravitee/index.md +++ b/website/integrations/services/gravitee/index.md @@ -30,7 +30,7 @@ To support the integration of Gravitee with authentik, you need to create an app ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/gravity/index.md b/website/integrations/services/gravity/index.md index f1e2a4b0dd..55b71e249a 100644 --- a/website/integrations/services/gravity/index.md +++ b/website/integrations/services/gravity/index.md @@ -32,7 +32,7 @@ To support the integration of Gravity with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively, you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: Provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: Select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/harbor/index.md b/website/integrations/services/harbor/index.md index e8f8bf77bf..3fab34acae 100644 --- a/website/integrations/services/harbor/index.md +++ b/website/integrations/services/harbor/index.md @@ -28,7 +28,7 @@ To support the integration of Harbor with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/hashicorp-vault/index.md b/website/integrations/services/hashicorp-vault/index.md index 22a2485e88..dbae49bee2 100644 --- a/website/integrations/services/hashicorp-vault/index.md +++ b/website/integrations/services/hashicorp-vault/index.md @@ -32,7 +32,7 @@ To support the integration of Hashicorp Vault with authentik, you need to create ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/hedgedoc/index.md b/website/integrations/services/hedgedoc/index.md index 57dfe1e946..05cff0b014 100644 --- a/website/integrations/services/hedgedoc/index.md +++ b/website/integrations/services/hedgedoc/index.md @@ -28,7 +28,7 @@ To support the integration of HedgeDoc with authentik, you need to create an app ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/hoarder/index.md b/website/integrations/services/hoarder/index.md index 1685c9669a..67dbb3091e 100644 --- a/website/integrations/services/hoarder/index.md +++ b/website/integrations/services/hoarder/index.md @@ -28,7 +28,7 @@ To support the integration of Hoarder with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/immich/index.md b/website/integrations/services/immich/index.md index aa60cfb95b..6a4227a545 100644 --- a/website/integrations/services/immich/index.md +++ b/website/integrations/services/immich/index.md @@ -28,7 +28,7 @@ To support the integration of Immich with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/jenkins/index.md b/website/integrations/services/jenkins/index.md index 78a2fe3c72..a2cd564327 100644 --- a/website/integrations/services/jenkins/index.md +++ b/website/integrations/services/jenkins/index.md @@ -28,7 +28,7 @@ To support the integration of Jenkins with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/kimai/index.md b/website/integrations/services/kimai/index.md index f0d7019cbe..7d34331afd 100644 --- a/website/integrations/services/kimai/index.md +++ b/website/integrations/services/kimai/index.md @@ -29,7 +29,7 @@ To support the integration of Kimai with authentik, you need to create an applic ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/komga/index.md b/website/integrations/services/komga/index.md index 3ac68d9572..65ded935f7 100644 --- a/website/integrations/services/komga/index.md +++ b/website/integrations/services/komga/index.md @@ -28,7 +28,7 @@ To support the integration of Komga with authentik, you need to create an applic ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/linkwarden/index.md b/website/integrations/services/linkwarden/index.md index 35ba0078e1..cb5fea4fbe 100644 --- a/website/integrations/services/linkwarden/index.md +++ b/website/integrations/services/linkwarden/index.md @@ -28,7 +28,7 @@ To support the integration of Linkwarden with authentik, you need to create an a ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/mastodon/index.md b/website/integrations/services/mastodon/index.md index 641c02e4ea..4c97348e40 100644 --- a/website/integrations/services/mastodon/index.md +++ b/website/integrations/services/mastodon/index.md @@ -28,7 +28,7 @@ To support the integration of Mastodon with authentik, you need to create an app ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/matrix-synapse/index.md b/website/integrations/services/matrix-synapse/index.md index f2606ae391..f8660a3347 100644 --- a/website/integrations/services/matrix-synapse/index.md +++ b/website/integrations/services/matrix-synapse/index.md @@ -28,7 +28,7 @@ To support the integration of Matrix Synapse with authentik, you need to create ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/mautic/index.md b/website/integrations/services/mautic/index.md index 1d207e782f..2c2959455f 100644 --- a/website/integrations/services/mautic/index.md +++ b/website/integrations/services/mautic/index.md @@ -65,7 +65,7 @@ Because Mautic requires a first name and last name attribute, create two [SAML p ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider**: select **SAML Provider** as the provider type. - **Configure the Provider**: diff --git a/website/integrations/services/meshcentral/index.md b/website/integrations/services/meshcentral/index.md index 95c2b1eab0..f3c171eabc 100644 --- a/website/integrations/services/meshcentral/index.md +++ b/website/integrations/services/meshcentral/index.md @@ -28,7 +28,7 @@ To support the integration of MeshCentral with authentik, you need to create an ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/miniflux/index.md b/website/integrations/services/miniflux/index.md index 096f2f2dcb..646c9a0d8d 100644 --- a/website/integrations/services/miniflux/index.md +++ b/website/integrations/services/miniflux/index.md @@ -28,7 +28,7 @@ To support the integration of Miniflux with authentik, you need to create an app ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name (e.g., `Miniflux`), an optional group for the type of application, the policy engine mode, and optional UI settings. diff --git a/website/integrations/services/minio/index.md b/website/integrations/services/minio/index.md index 872fabdf76..302d26d6a7 100644 --- a/website/integrations/services/minio/index.md +++ b/website/integrations/services/minio/index.md @@ -61,7 +61,7 @@ You can assign multiple policies to a user by returning a list, and returning `N ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/mobilizon/index.md b/website/integrations/services/mobilizon/index.md index aa7d64df7e..d2f941b178 100644 --- a/website/integrations/services/mobilizon/index.md +++ b/website/integrations/services/mobilizon/index.md @@ -28,7 +28,7 @@ To support the integration of Mobilizon with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/netbird/index.md b/website/integrations/services/netbird/index.md index e70ff29c36..f6907c1e51 100644 --- a/website/integrations/services/netbird/index.md +++ b/website/integrations/services/netbird/index.md @@ -28,7 +28,7 @@ To support the integration of NetBird with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/netbox/index.md b/website/integrations/services/netbox/index.md index c8e7b5b13d..b6ba279f20 100644 --- a/website/integrations/services/netbox/index.md +++ b/website/integrations/services/netbox/index.md @@ -28,7 +28,7 @@ To support the integration of NetBox with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/node-red/index.md b/website/integrations/services/node-red/index.md index 7880e042dd..8dca448565 100644 --- a/website/integrations/services/node-red/index.md +++ b/website/integrations/services/node-red/index.md @@ -34,7 +34,7 @@ To support the integration of Node-RED with authentik, you need to create an app ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/observium/index.md b/website/integrations/services/observium/index.md index be69352f0b..f462e6fb8e 100644 --- a/website/integrations/services/observium/index.md +++ b/website/integrations/services/observium/index.md @@ -45,7 +45,7 @@ To support the integration of Observium with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/open-webui/index.md b/website/integrations/services/open-webui/index.md index 0516761a4f..b3234a6b8d 100644 --- a/website/integrations/services/open-webui/index.md +++ b/website/integrations/services/open-webui/index.md @@ -28,7 +28,7 @@ To support the integration of Open WebUI with authentik, you need to create an a ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/oracle-cloud/index.md b/website/integrations/services/oracle-cloud/index.md index b1a6ebf862..65cc7ff210 100644 --- a/website/integrations/services/oracle-cloud/index.md +++ b/website/integrations/services/oracle-cloud/index.md @@ -28,7 +28,7 @@ To support the integration of Oracle Cloud with authentik, you need to create an ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/outline/index.md b/website/integrations/services/outline/index.md index 50aca83e10..6c36ab8cbf 100644 --- a/website/integrations/services/outline/index.md +++ b/website/integrations/services/outline/index.md @@ -29,7 +29,7 @@ To support the integration of Outline with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/owncloud/index.md b/website/integrations/services/owncloud/index.md index e8df7ac4ad..631c4ec2fe 100644 --- a/website/integrations/services/owncloud/index.md +++ b/website/integrations/services/owncloud/index.md @@ -30,7 +30,7 @@ The configuration for each application is nearly identical, except for the **Cli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) You will need to repeat the process four times: once each for the Desktop application, Web UI, Android application, and iOS application. +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) You will need to repeat the process four times: once each for the Desktop application, Web UI, Android application, and iOS application. - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/paperless-ngx/index.mdx b/website/integrations/services/paperless-ngx/index.mdx index 579c7972bc..a0f46fbffd 100644 --- a/website/integrations/services/paperless-ngx/index.mdx +++ b/website/integrations/services/paperless-ngx/index.mdx @@ -28,7 +28,7 @@ To support the integration of Paperless-ngx with authentik, you need to create a ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/pgadmin/index.md b/website/integrations/services/pgadmin/index.md index 95afec7ea1..e0473f5d24 100644 --- a/website/integrations/services/pgadmin/index.md +++ b/website/integrations/services/pgadmin/index.md @@ -32,7 +32,7 @@ To support the integration of pgAdmin with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/plesk/index.md b/website/integrations/services/plesk/index.md index 5eb2abb206..9b658285d5 100644 --- a/website/integrations/services/plesk/index.md +++ b/website/integrations/services/plesk/index.md @@ -35,7 +35,7 @@ To support the integration of Plesk with authentik, you need to create an applic ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/portainer/index.md b/website/integrations/services/portainer/index.md index c2dee6fc44..6b280b707c 100644 --- a/website/integrations/services/portainer/index.md +++ b/website/integrations/services/portainer/index.md @@ -32,7 +32,7 @@ To support the integration of Portainer with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/proxmox-ve/index.md b/website/integrations/services/proxmox-ve/index.md index 5a79a1c468..659190a278 100644 --- a/website/integrations/services/proxmox-ve/index.md +++ b/website/integrations/services/proxmox-ve/index.md @@ -32,7 +32,7 @@ To support the integration of Proxmox with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/rocketchat/index.md b/website/integrations/services/rocketchat/index.md index 91b4a449f6..7fc82976af 100644 --- a/website/integrations/services/rocketchat/index.md +++ b/website/integrations/services/rocketchat/index.md @@ -32,7 +32,7 @@ To support the integration of Rocket.chat with authentik, you need to create an ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/roundcube/index.md b/website/integrations/services/roundcube/index.md index a9d535a005..be7f22bf26 100644 --- a/website/integrations/services/roundcube/index.md +++ b/website/integrations/services/roundcube/index.md @@ -50,7 +50,7 @@ To support the integration of Roundcube with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/rustdesk-pro/index.mdx b/website/integrations/services/rustdesk-pro/index.mdx index 7d10832d93..7cae0e0595 100644 --- a/website/integrations/services/rustdesk-pro/index.mdx +++ b/website/integrations/services/rustdesk-pro/index.mdx @@ -32,7 +32,7 @@ To support the integration of Rustdesk Server Pro with authentik, you need to cr ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/semaphore/index.mdx b/website/integrations/services/semaphore/index.mdx index 7efc8379dd..095d533597 100644 --- a/website/integrations/services/semaphore/index.mdx +++ b/website/integrations/services/semaphore/index.mdx @@ -30,7 +30,7 @@ To support the integration of Semaphore with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/synology-dsm/index.md b/website/integrations/services/synology-dsm/index.md index 05b1af537c..09aa93544a 100644 --- a/website/integrations/services/synology-dsm/index.md +++ b/website/integrations/services/synology-dsm/index.md @@ -32,7 +32,7 @@ To support the integration of Synology DSM with authentik, you need to create an ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/tandoor/index.md b/website/integrations/services/tandoor/index.md index 54d9c79f30..47e9aa61da 100644 --- a/website/integrations/services/tandoor/index.md +++ b/website/integrations/services/tandoor/index.md @@ -28,7 +28,7 @@ To support the integration of Tandoor with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name (e.g., `Tandoor`), an optional group for the type of application, the policy engine mode, and optional UI settings. diff --git a/website/integrations/services/terrakube/index.md b/website/integrations/services/terrakube/index.md index 1f23c9a2d6..81d5d775d2 100644 --- a/website/integrations/services/terrakube/index.md +++ b/website/integrations/services/terrakube/index.md @@ -28,7 +28,7 @@ To support the integration of Terrakube with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/truecommand/index.md b/website/integrations/services/truecommand/index.md index 11ab87551b..7b51ae5bbd 100644 --- a/website/integrations/services/truecommand/index.md +++ b/website/integrations/services/truecommand/index.md @@ -62,7 +62,7 @@ To support the integration of TrueCommand with authentik, you need to create an ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/ubuntu-landscape/index.md b/website/integrations/services/ubuntu-landscape/index.md index 93c0702ef5..916f2e9ed1 100644 --- a/website/integrations/services/ubuntu-landscape/index.md +++ b/website/integrations/services/ubuntu-landscape/index.md @@ -34,7 +34,7 @@ To support the integration of Landscape with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/uptime-kuma/index.md b/website/integrations/services/uptime-kuma/index.md index b94823a0ad..30f38a1b6c 100644 --- a/website/integrations/services/uptime-kuma/index.md +++ b/website/integrations/services/uptime-kuma/index.md @@ -30,7 +30,7 @@ To support the integration of Uptime Kuma with authentik, you need to create an ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **Proxy Provider** as the provider type. diff --git a/website/integrations/services/vikunja/index.md b/website/integrations/services/vikunja/index.md index 9d207a6953..a36d3c7789 100644 --- a/website/integrations/services/vikunja/index.md +++ b/website/integrations/services/vikunja/index.md @@ -33,7 +33,7 @@ To support the integration of Vikunja with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/vmware-vcenter/index.md b/website/integrations/services/vmware-vcenter/index.md index a01041dc64..53cfc73479 100644 --- a/website/integrations/services/vmware-vcenter/index.md +++ b/website/integrations/services/vmware-vcenter/index.md @@ -30,7 +30,7 @@ To support the integration of vCenter with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/weblate/index.md b/website/integrations/services/weblate/index.md index 2bcd67aaab..a8d80d629d 100644 --- a/website/integrations/services/weblate/index.md +++ b/website/integrations/services/weblate/index.md @@ -66,7 +66,7 @@ To support the integration of Weblate with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/wekan/index.mdx b/website/integrations/services/wekan/index.mdx index eb648c88bf..0f8807eb16 100644 --- a/website/integrations/services/wekan/index.mdx +++ b/website/integrations/services/wekan/index.mdx @@ -28,7 +28,7 @@ To support the integration of Wekan with authentik, you need to create an applic ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/whats-up-docker/index.md b/website/integrations/services/whats-up-docker/index.md index 59df0383d2..34e82ded48 100644 --- a/website/integrations/services/whats-up-docker/index.md +++ b/website/integrations/services/whats-up-docker/index.md @@ -28,7 +28,7 @@ To support the integration of What's Up Docker with authentik, you need to creat ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/wiki-js/index.md b/website/integrations/services/wiki-js/index.md index 4dede03b2a..86dca4d8d4 100644 --- a/website/integrations/services/wiki-js/index.md +++ b/website/integrations/services/wiki-js/index.md @@ -38,7 +38,7 @@ To support the integration of Wiki.js with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/wordpress/index.md b/website/integrations/services/wordpress/index.md index 2cbc79355d..ce64052f92 100644 --- a/website/integrations/services/wordpress/index.md +++ b/website/integrations/services/wordpress/index.md @@ -32,7 +32,7 @@ To support the integration of WordPress with authentik, you need to create an ap ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/writefreely/index.md b/website/integrations/services/writefreely/index.md index 01b6dded45..51b633bc1e 100644 --- a/website/integrations/services/writefreely/index.md +++ b/website/integrations/services/writefreely/index.md @@ -32,7 +32,7 @@ To support the integration of Writefreely with authentik, you need to create an ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/xen-orchestra/index.md b/website/integrations/services/xen-orchestra/index.md index 7c0c373b69..3d8892232f 100644 --- a/website/integrations/services/xen-orchestra/index.md +++ b/website/integrations/services/xen-orchestra/index.md @@ -33,7 +33,7 @@ To support the integration of Xen Orchestra with authentik, you need to create a ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/zabbix/index.md b/website/integrations/services/zabbix/index.md index c23cff46b6..8ac882e343 100644 --- a/website/integrations/services/zabbix/index.md +++ b/website/integrations/services/zabbix/index.md @@ -30,7 +30,7 @@ To support the integration of Zabbix with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/zammad/index.md b/website/integrations/services/zammad/index.md index cf0dc1ce57..dd6b1e9a3a 100644 --- a/website/integrations/services/zammad/index.md +++ b/website/integrations/services/zammad/index.md @@ -44,7 +44,7 @@ To support the integration of Zammad with authentik, you need to create an appli ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/services/zipline/index.md b/website/integrations/services/zipline/index.md index fffbf21ba1..dc3cac2dd7 100644 --- a/website/integrations/services/zipline/index.md +++ b/website/integrations/services/zipline/index.md @@ -32,7 +32,7 @@ To support the integration of Zipline with authentik, you need to create an appl ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively, you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: Provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Choose a Provider type**: Select **OAuth2/OpenID Connect** as the provider type. diff --git a/website/integrations/services/zulip/index.md b/website/integrations/services/zulip/index.md index 36a8099892..f6e301c504 100644 --- a/website/integrations/services/zulip/index.md +++ b/website/integrations/services/zulip/index.md @@ -29,7 +29,7 @@ To support the integration of Zulip with authentik, you need to create an applic ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. - **Choose a Provider type**: select **SAML Provider** as the provider type. diff --git a/website/integrations/template/service.md b/website/integrations/template/service.md index 13af35334f..298f2520f5 100644 --- a/website/integrations/template/service.md +++ b/website/integrations/template/service.md @@ -30,7 +30,7 @@ _Any specific info about this integration can go here._ ### Create an application and provider in authentik 1. Log in to authentik as an admin, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can create only an application, without a provider, by clicking **Create**.) +2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - _If there are any specific settings required, list them here. Refer to the [ownCloud integration documentation](https://github.com/goauthentik/authentik/blob/main/website/integrations/services/owncloud/index.md) for a complex requirements example._