From a40c7c26ad9c8cd288374122eeac5ca05a650f60 Mon Sep 17 00:00:00 2001 From: ddeyo Date: Tue, 4 Sep 2018 21:48:15 -0700 Subject: [PATCH] replaceable tagging --- ee/ucp/admin/configure/enable-saml-authentication.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/ee/ucp/admin/configure/enable-saml-authentication.md b/ee/ucp/admin/configure/enable-saml-authentication.md index 119f35b02a..ff1a1b07fb 100644 --- a/ee/ucp/admin/configure/enable-saml-authentication.md +++ b/ee/ucp/admin/configure/enable-saml-authentication.md @@ -31,8 +31,8 @@ There are values your identity provider needs for successful integration with UC Okta integration requires these values: -- URL for single signon (SSO). This value is the URL for UCP, qualified with `/enzi/v0/saml/acs`. For example, `https://111.111.111.111/enzi/v0/saml/acs`. -- Service provider audience URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://111.111.111.111/enzi/v0/saml/metadata`. +- URL for single signon (SSO). This value is the URL for UCP, qualified with `/enzi/v0/saml/acs`. For example, `https://<^>111.111.111.111<^^>/enzi/v0/saml/acs`. +- Service provider audience URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://<^>111.111.111.111<^^>/enzi/v0/saml/metadata`. - NameID format. Select Unspecified. - Application username. Email (For example, a custom `${f:substringBefore(user.email, "@")}` specifies the username in the email address. - Attribute Statements: @@ -46,7 +46,7 @@ Name: `is-admin`, Filter: (user defined) for identifying if the user is an admin ADFS integration requires these values: -- Service provider metadata URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://111.111.111.111/enzi/v0/saml/metadata`. +- Service provider metadata URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://<^>111.111.111.111<^^>/enzi/v0/saml/metadata`. - Attribute Store: Active Directory. - Add LDAP Attribute = Email Address; Outgoing Claim Type: Email Address - Add LDAP Attribute = Display-Name; Outgoing Claim Type: Common Name