diff --git a/website/docs/feature-flag-tutorials/use-cases/security-compliance.md b/website/docs/feature-flag-tutorials/use-cases/security-compliance.md index 0461cf53a0..a8b2ce5abd 100644 --- a/website/docs/feature-flag-tutorials/use-cases/security-compliance.md +++ b/website/docs/feature-flag-tutorials/use-cases/security-compliance.md @@ -42,7 +42,7 @@ Your developers and other stakeholders need to securely access platforms used to To use single sign-on in Unleash, your users can authenticate themselves through OpenID Connect (OIDC) or SAML 2.0 protocols. -We have integration guides to connect Unleash to enterprise identity providers like Okta, Microsoft Entra ID, and Keycloak, but you can use any identity provider that uses OIDC or SAML 2.0 protocol. Read our [how-to guide for single sign-on](/how-to/sso). +We have integration guides to connect Unleash to enterprise identity providers like Okta, Microsoft Entra ID, and Keycloak, but you can use any identity provider that uses OIDC or SAML 2.0 protocol. Read our [how-to guide for single sign-on](/how-to/how-to-add-sso-open-id-connect). ![A diagram showing how Unleash integrates with authentication providers and identity providers.](/img/sso-idp-auth-provider.jpg) @@ -65,7 +65,7 @@ By enabling [SCIM](/reference/scim) in Unleash, you can: - Sync group membership. - Ensure consistent access across multiple platforms. -To unlock these benefits, set up [SCIM for automatic provisioning using our how-to guides](/how-to/provisioning). +To unlock these benefits, set up [SCIM for automatic provisioning using our how-to guides](/how-to/how-to-setup-provisioning-with-okta). ## Configure role-based access control for administrators and developers diff --git a/website/docs/feature-flag-tutorials/use-cases/user-management-access-controls.md b/website/docs/feature-flag-tutorials/use-cases/user-management-access-controls.md index 14a33416b6..ebb872cd98 100644 --- a/website/docs/feature-flag-tutorials/use-cases/user-management-access-controls.md +++ b/website/docs/feature-flag-tutorials/use-cases/user-management-access-controls.md @@ -19,7 +19,7 @@ In this tutorial, you will: When an enterprise like a global banking platform considers implementing feature flags, keeping track of who can access your feature flag platform and handling authentication is critical. Traditional username and password approaches are insecure and [shared accounts pose a security risk](https://www.getunleash.io/blog/stop-sharing-accounts). -To ensure proper user authentication and reduce risk exposure, Unleash provides [single sign-on](/how-to/sso) as the recommended centralized method for managing user access. +To ensure proper user authentication and reduce risk exposure, Unleash provides [single sign-on](/how-to/how-to-add-sso-open-id-connect) as the recommended centralized method for managing user access. Unleash supports any SSO option through OpenID Connect or SAML 2.0, including identity providers like Okta, Microsoft Entra ID, and Keycloak to create a unified authentication process. diff --git a/website/docs/how-to/how-to-run-the-unleash-proxy.mdx b/website/docs/how-to/how-to-run-the-unleash-proxy.mdx index 8440070deb..839a154a13 100644 --- a/website/docs/how-to/how-to-run-the-unleash-proxy.mdx +++ b/website/docs/how-to/how-to-run-the-unleash-proxy.mdx @@ -4,9 +4,9 @@ title: How to run the Unleash Proxy import ApiRequest from '@site/src/components/ApiRequest' -:::info Placeholders +:::warning -Placeholders in the code samples below are delimited by angle brackets (i.e. ``). You will need to replace them with the values that are correct in _your_ situation for the code samples to run properly. +Unleash Proxy is deprecated. Use [Unleash Edge](/reference/unleash-edge) instead. ::: diff --git a/website/docs/reference/terraform.mdx b/website/docs/reference/terraform.mdx index ad96b78118..6090eef42a 100644 --- a/website/docs/reference/terraform.mdx +++ b/website/docs/reference/terraform.mdx @@ -65,7 +65,7 @@ resource "unleash_api_token" "client_token" { ### Single sign-on protocols - `unleash_oidc`: Manage your [OpenID Connect configuration](../how-to/how-to-add-sso-open-id-connect). -- `unleash_saml`: Manage your [SAML configuration](../how-to/sso). +- `unleash_saml`: Manage your [SAML configuration](../how-to/how-to-add-sso-saml). ### Context fields diff --git a/website/sidebars.ts b/website/sidebars.ts index ef44659f6f..83608b5f57 100644 --- a/website/sidebars.ts +++ b/website/sidebars.ts @@ -582,10 +582,8 @@ const sidebars: SidebarsConfig = { ], type: 'category', link: { - type: 'generated-index', - title: 'How-to: Single sign-on', - description: 'Single sign-on guides.', - slug: '/how-to/sso', + type: 'doc', + id: 'how-to/how-to-add-sso-open-id-connect', }, }, { @@ -596,10 +594,8 @@ const sidebars: SidebarsConfig = { ], type: 'category', link: { - type: 'generated-index', - title: 'How to: Provisioning', - description: 'Provisioning how-to guides.', - slug: '/how-to/provisioning', + type: 'doc', + id: 'how-to/how-to-setup-provisioning-with-okta' }, }, { @@ -649,11 +645,8 @@ const sidebars: SidebarsConfig = { label: 'Troubleshooting', type: 'category', link: { - type: 'generated-index', - title: 'How-to: troubleshooting', - description: - 'Troubleshooting common problems. If you want to suggest new items, please phrase the title as a concrete problem', - slug: '/using-unleash/troubleshooting', + type: 'doc', + id: '/using-unleash/troubleshooting/cors', }, items: [ 'using-unleash/troubleshooting/cors', @@ -690,18 +683,6 @@ const sidebars: SidebarsConfig = { 'how-to/how-to-enable-openapi', ], }, - { - label: 'Unleash Proxy guides', - type: 'category', - link: { - type: 'generated-index', - title: 'How-to: The Unleash Proxy', - description: - 'Learn how to work with the Unleash Proxy', - slug: '/how-to/proxy', - }, - items: ['how-to/how-to-run-the-unleash-proxy'], - }, { label: 'Feature flags, strategies, context', type: 'category', @@ -758,10 +739,8 @@ const sidebars: SidebarsConfig = { type: 'category', collapsed: true, link: { - type: 'generated-index', - title: 'Contributing to Unleash', - description: 'Learn how to contribute to unleash.', - slug: '/contributing', + type: 'doc', + id: 'contributing/developer-guide', }, items: [ 'contributing/developer-guide', diff --git a/website/vercel.json b/website/vercel.json index bdd14d2d73..5aa7fccdc4 100644 --- a/website/vercel.json +++ b/website/vercel.json @@ -881,6 +881,26 @@ "destination": "/using-unleash/deploy/configuring-unleash", "permanent": true }, + { + "source": "/using-unleash/troubleshooting", + "destination": "/using-unleash/troubleshooting/cors", + "permanent": true + }, + { + "source": "/contributing", + "destination": "/contributing/developer-guide", + "permanent": true + }, + { + "source": "/how-to/sso", + "destination": "/how-to/how-to-add-sso-open-id-connect", + "permanent": true + }, + { + "source": "/how-to/provisioning", + "destination": "/how-to/how-to-setup-provisioning-with-okta", + "permanent": true + }, { "source": "/reference/deploy/configuring-unleash-v3", "destination": "/using-unleash/deploy/configuring-unleash-v3",