Skip to content

Commit

Permalink
Document Okta OIDC provider workaround (#11948) (#12000)
Browse files Browse the repository at this point in the history
This is the docs counterpart to #11718

Co-authored-by: Paul Gottschling <[email protected]>
  • Loading branch information
zmb3 and ptgott authored Apr 15, 2022
1 parent 71a2662 commit 92ee85a
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions docs/pages/enterprise/sso.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -148,9 +148,9 @@ values to match your identity provider:
to the full [ADFS guide](./sso/adfs.mdx#create-teleport-roles) for details.
- `netiq` (OIDC): Used to enable NetIQ-specific ACR value processing; refer to
the [OIDC guide](./sso/oidc.mdx#optional-acr-values) for details.
- `ping` (SAML): Required for compatibility with Ping Identity (including
PingOne and PingFederate) when "Enforced Signed Authn Requests" is enabled in
the application settings.
- `ping` (SAML and OIDC): Required for compatibility with Ping Identity (including
PingOne and PingFederate).
- `okta` (OIDC): Required when using Okta as an OIDC provider.

At this time, the `spec.provider` field should not be set for any other identity providers.

Expand Down

0 comments on commit 92ee85a

Please sign in to comment.