Skip to content

Commit

Permalink
Document Okta OIDC provider workaround (#11948)
Browse files Browse the repository at this point in the history
* Document Okta OIDC provider workaround

This is the docs counterpart to #11718

* Update docs/pages/enterprise/sso.mdx

Co-authored-by: Paul Gottschling <paul.gottschling@goteleport.com>

Co-authored-by: Paul Gottschling <paul.gottschling@goteleport.com>
  • Loading branch information
zmb3 and ptgott committed Apr 15, 2022
1 parent d67d3a2 commit 1146d20
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions docs/pages/enterprise/sso.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -148,9 +148,9 @@ values to match your identity provider:
to the full [ADFS guide](./sso/adfs.mdx#create-teleport-roles) for details.
- `netiq` (OIDC): Used to enable NetIQ-specific ACR value processing; refer to
the [OIDC guide](./sso/oidc.mdx#optional-acr-values) for details.
- `ping` (SAML): Required for compatibility with Ping Identity (including
PingOne and PingFederate) when "Enforced Signed Authn Requests" is enabled in
the application settings.
- `ping` (SAML and OIDC): Required for compatibility with Ping Identity (including
PingOne and PingFederate).
- `okta` (OIDC): Required when using Okta as an OIDC provider.

At this time, the `spec.provider` field should not be set for any other identity providers.

Expand Down

0 comments on commit 1146d20

Please sign in to comment.