diff --git a/website/docs/add-secure-apps/providers/oauth2/create-oauth2-provider.md b/website/docs/add-secure-apps/providers/oauth2/create-oauth2-provider.md index cec8a2920103..78211f43208f 100644 --- a/website/docs/add-secure-apps/providers/oauth2/create-oauth2-provider.md +++ b/website/docs/add-secure-apps/providers/oauth2/create-oauth2-provider.md @@ -2,13 +2,13 @@ title: Create an OAuth2 provider --- -To create a provider along with the corresponding application that uses it for authentication, navigate to **Applications** > **Applications** and click **New Provider**. We recommend this combined approach for most common use cases. Alternatively, you can use the legacy method to solely create the provider by navigating to **Applications** > **Providers** and clicking **Create**. +To create a provider along with the corresponding application that uses it for authentication, navigate to **Applications** > **Applications** and click **New Application**. We recommend this combined approach for most common use cases. Alternatively, you can use the legacy method to solely create the provider by navigating to **Applications** > **Providers** and clicking **New Provider**. 1. Log in to authentik as an administrator and open the authentik Admin interface. -2. Navigate to **Applications > Applications** and click **New Provider** to create an application and provider pair. +2. Navigate to **Applications > Applications** and click **New Application** to create an application and provider pair. 3. On the **New application** page, define the application settings, and then click **Next**. 4. Select **OAuth2/OIDC** as the **Provider Type**, and then click **Next**. -5. On the **Configure OAuth2/OpenId Provider** page, provide the configuration settings and then click **Submit** to create both the application and the provider. +5. On the **Configure OAuth2/OpenId Provider** page, provide the configuration settings and then click **Create** to create both the application and the provider. :::info Optionally, configure the provider with the `offline_access` scope mapping. By default, applications only receive an access token. To receive a refresh token, applications and authentik must be configured to request the `offline_access` scope. Do this in the Scope mapping area on the **Configure OAuth2/OpenId Provider** page. diff --git a/website/docs/add-secure-apps/providers/saml/create-saml-provider.md b/website/docs/add-secure-apps/providers/saml/create-saml-provider.md index 3206d43c23fd..2af6c9a2418e 100644 --- a/website/docs/add-secure-apps/providers/saml/create-saml-provider.md +++ b/website/docs/add-secure-apps/providers/saml/create-saml-provider.md @@ -6,13 +6,13 @@ authentik SAML providers can be created either from scratch or by using SAML met ## Create a SAML provider and application pair -To create a provider along with the corresponding application that uses it for authentication, navigate to **Applications** > **Applications** and click **New Provider**. We recommend this combined approach for most common use cases. Alternatively, you can use the legacy method to solely create the provider by navigating to **Applications** > **Providers** and clicking **Create**. +To create a provider along with the corresponding application that uses it for authentication, navigate to **Applications** > **Applications** and click **New Application**. We recommend this combined approach for most common use cases. Alternatively, you can use the legacy method to solely create the provider by navigating to **Applications** > **Providers** and clicking **New Provider**. 1. Log in to authentik as an administrator, and open the authentik Admin interface. -2. Navigate to **Applications** > **Applications** and click **New Provider** to create an application and provider pair. +2. Navigate to **Applications** > **Applications** and click **New Application** to create an application and provider pair. 3. On the **New application** page, define the application details, and then click **Next**. 4. Select **SAML Provider** as the **Provider Type**, and then click **Next**. -5. On the **Configure SAML Provider** page, provide the configuration settings and then click **Submit** to create both the application and the provider. +5. On the **Configure SAML Provider** page, provide the configuration settings and then click **Create** to create both the application and the provider. ## Create a SAML provider from SP metadata (import SP metadata) diff --git a/website/docs/add-secure-apps/providers/wsfed/create-wsfed-provider.md b/website/docs/add-secure-apps/providers/wsfed/create-wsfed-provider.md index 30e459d3da18..f724c0827c50 100644 --- a/website/docs/add-secure-apps/providers/wsfed/create-wsfed-provider.md +++ b/website/docs/add-secure-apps/providers/wsfed/create-wsfed-provider.md @@ -7,13 +7,13 @@ An authentik WS-Federation provider is typically created as part of an applicati ## Create a WS-Federation provider and application pair 1. Log in to authentik as an administrator, and open the authentik Admin interface. -2. Navigate to **Applications > Applications** and click **New Provider** to create an application and provider pair. +2. Navigate to **Applications > Applications** and click **New Application** to create an application and provider pair. 3. On the **New application** page, define the application details, and then click **Next**. 4. Select **WS-Federation Provider** as the **Provider Type**, and then click **Next**. 5. On the **Configure WS-Federation Provider** page, provide a name for the provider, select an authorization flow, and the two required configuration settings: - **Reply URL**: Enter the application callback URL, where the token should be sent. This is the specific endpoint on an RP (application) where an Identity Provider (STS) sends the security token and authentication response after a successful log in. - **Realm**: Enter the identifier (string) of the requesting realm; that is, the Relying Party (RP) or application receiving the token. Realm is similar to the SAML 2.0 Entity ID. -6. Click **Submit** to create both the application and the provider. +6. Click **Create** to create both the application and the provider. ## Export authentik WS-Federation provider metadata