website/integrations: add missing step to create mappings (#3748)

* Update index.md

Added Customisation menu helper under Step 1

Signed-off-by: Nick Baughman <baughmann1@gmail.com>

* fix same issue in other docs

Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>

Signed-off-by: Nick Baughman <baughmann1@gmail.com>
Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
Co-authored-by: Jens Langhammer <jens.langhammer@beryju.org>
This commit is contained in:
Nick Baughman 2022-10-14 06:38:56 -07:00 committed by GitHub
parent 74a0e27a8c
commit 799452dc65
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 4 additions and 4 deletions

View File

@ -19,7 +19,7 @@ The following placeholders will be used:
- `minio.company` is the FQDN of the MinIO install. - `minio.company` is the FQDN of the MinIO install.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik install.
Under _Property Mappings_, create a _Scope Mapping_. Give it a name like "OIDC-Scope-minio". Set the scope name to `minio` and the expression to the following Under _Customization_ -> _Property Mappings_, create a _Scope Mapping_. Give it a name like "OIDC-Scope-minio". Set the scope name to `minio` and the expression to the following
```python ```python
return { return {

View File

@ -20,7 +20,7 @@ The following placeholders will be used:
- `rancher.company` is the FQDN of the Rancher install. - `rancher.company` is the FQDN of the Rancher install.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik install.
Under _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following Under _Customization_ -> _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following
```python ```python
return f"{user.pk}-{user.username}" return f"{user.pk}-{user.username}"

View File

@ -25,7 +25,7 @@ The following placeholders will be used:
Create a new oauth2 Scope Mapping which does not return the 'group' values and associate this mapping Create a new oauth2 Scope Mapping which does not return the 'group' values and associate this mapping
in the provider settings instead of the default oauth mapping. in the provider settings instead of the default oauth mapping.
Under _Property Mappings_, create a _Scope Mapping_. Give it a name like "oauth2-Scope-dovecot". Set the scope name to `dovecotprofile` and the expression to the following Under _Customization_ -> _Property Mappings_, create a _Scope Mapping_. Give it a name like "oauth2-Scope-dovecot". Set the scope name to `dovecotprofile` and the expression to the following
``` ```
return { return {

View File

@ -35,7 +35,7 @@ Since vCenter only allows OpenID-Connect in combination with Active Directory, i
### Step 1 ### Step 1
Under _Property Mappings_, create a _Scope Mapping_. Give it a name like "OIDC-Scope-VMware-vCenter". Set the scope name to `openid` and the expression to the following Under _Customization_ -> _Property Mappings_, create a _Scope Mapping_. Give it a name like "OIDC-Scope-VMware-vCenter". Set the scope name to `openid` and the expression to the following
```python ```python
return { return {