From 189f74d542ad3ded29d5901ca1a5ec8a25f1e462 Mon Sep 17 00:00:00 2001 From: ddeyo Date: Mon, 3 Sep 2018 18:35:53 -0700 Subject: [PATCH] IDP provider values added --- ee/ucp/admin/configure/enable-saml-authentication.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/ee/ucp/admin/configure/enable-saml-authentication.md b/ee/ucp/admin/configure/enable-saml-authentication.md index cdcb1f4e52..a148078214 100644 --- a/ee/ucp/admin/configure/enable-saml-authentication.md +++ b/ee/ucp/admin/configure/enable-saml-authentication.md @@ -12,12 +12,12 @@ UCP supports Security Assertion Markup Language (SAML) for authentication. SAML A list of the identity providers that we support is found in the [Docker Compatibility matrix] (http://success.docker.com/article/compatibility-matrix). -## Identity provider integration steps +## Configure identity provider integration -There are data your identity provider needs for successful integration with UCP. Typivally these are: +There are values your identity provider needs for successful integration with UCP. Typically these are: -- URL for single signon (SSO). -- Service provider audience URI. +- URL for single signon (SSO). This value is the URL for UCP, qualified with `/enzi/v0/sami/acs`. For example, `https://111.111.111.111/enzi/v0/sami/acs`. +- Service provider audience URI. This value is the URL for UCP, qualified with `/enzi/v0/sami/metadata`. For example, `https://111.111.111.111/enzi/v0/sami/metadata`. ## Configure the SAML integration