Skip to content

Commit 6656c48

Browse files
Jeff Smithtamigoodallerjohnsonrkhorianderdavidpatrick
authored
[DO NOT MERGE] Contentful Launch, Attempt 2 (#9285)
Co-authored-by: Tami Goodall <[email protected]> Co-authored-by: erjohnson <[email protected]> Co-authored-by: Rachel Khoriander <[email protected]> Co-authored-by: David <[email protected]>
1 parent 56813e5 commit 6656c48

File tree

17 files changed

+8049
-3284
lines changed

17 files changed

+8049
-3284
lines changed

articles/api/authentication/legacy/_impersonation.md

-5
Original file line numberDiff line numberDiff line change
@@ -79,8 +79,3 @@ Use this endpoint to obtain an impersonation URL to login as another user. Usefu
7979
- To distinguish between real logins and impersonation logins, the profile of the impersonated user will contain additional impersonated and impersonator properties. For example: `"impersonated": true, "impersonator": {"user_id": "auth0|...", "email": "[email protected]"}`.
8080

8181
- For a regular web app, you should set the `additionalParameters`: set the `response_type` to be `code`, the `callback_url` to be the <dfn data-key="callback">callback URL</dfn> to which Auth0 will redirect with the authorization code, and the <dfn data-key="scope">`scope`</dfn> to be the JWT claims that you want included in the JWT.
82-
83-
84-
### More Information
85-
86-
- [Impersonate Users](/users/guides/impersonate-users-using-the-dashboard)

articles/architecture-scenarios/implementation/b2b/b2b-architecture.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ In most cases, provisioning separate Auth0 tenants for your customer's organizat
2525
* Your customers' organizations have isolated users that aren't shared with other organizations.
2626
* You have some customer organizations that support more than one IdP. For example, your customer has their own IdP but also has some users that aren't in their IdP and whose credentials you will need to store. Or, your customer wants to provide for one or more social connections in addition to their enterprise IdP.
2727

28-
If both of these situations are the case, then we recommend that you create separate Auth0 tenants for each customer that needs it. This allows you to have a separate custom domain for them and to easily customize their login experience, including [Home Realm Discovery](/architecture-scenarios/b2b/b2b-authentication#home-real-discovery) on their login page.
28+
If both of these situations are the case, then we recommend that you create separate Auth0 tenants for each customer that needs it. This allows you to have a separate custom domain for them and to easily customize their login experience, including [Home Realm Discovery](/architecture-scenarios/implementation/b2b/b2b-authentication#home-real-discovery) on their login page.
2929

3030
::: warning
3131
Maintaining multiple Auth0 tenants can add complexity to your system and should not be done unless absolutely necessary.

articles/architecture-scenarios/implementation/b2b/b2b-provisioning.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ You need to provision those users at the IdP level. Each of the organizations wi
4646
* You convince them to create (or find that they already have) one master IdP that can route to their individual IdPs.
4747
* You create separate organizations (e.g. customerorg-department1 and customerorg-department2) in your applications.
4848
* You set up a new Auth0 tenant just for them and add as many IdPs as they need (which may include a database in Auth0) to that tenant, along with their own custom domain and branding.
49-
* You make your existing tenant and login page more complex to handle [Home Realm Discovery](/architecture-scenarios/b2b/b2b-authentication#home-real-discovery) just for organizations that have more than one IdP.
49+
* You make your existing tenant and login page more complex to handle [Home Realm Discovery](/architecture-scenarios/implementation/b2b/b2b-authentication#home-real-discovery) just for organizations that have more than one IdP.
5050

5151
We recommend using Auth0 as an IdP as a starting point because it’s simple to implement a user invite workflow: an administrator creates a user; a randomly-generated password is created for that user, but never stored or shown to anyone; and then the user receives a welcome email with a link to set their password. Compared to other invite flows, the only thing special about this is that the person who is creating the user will have to either select the organization ahead of time, or the system will force the organization to match that of the user doing the inviting (in situations where there is an organization administrator who belongs to that organization only). To learn more, see [User invite](#user-invite).
5252

articles/architecture-scenarios/web-app-sso/part-2.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ For more information on database connections refer to [Database Identity Provide
8585

8686
### Create an Active Directory / LDAP Connection
8787

88-
Next you need to configure your Active Directory / LDAP connection. Go to the [Auth0 dashboard](${manage_url}) and in the side navigation select the [Connections > Enterprise](${manage_url}/#/connections/enterprise)).
88+
Next you need to configure your Active Directory / LDAP connection. Go to the [Auth0 dashboard](${manage_url}) and in the side navigation, select [Connections > Enterprise](${manage_url}/#/connections/enterprise).
8989

9090
There you need to create the AD / LDAP connection and install the AD Connector. You can find details in these documents:
9191
- [How to connect your Active Directory with Auth0](/connections/enterprise/active-directory-ldap)

articles/connections/calling-an-external-idp-api.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ You will need an Access Token to call the [Management API](/api/management/v2).
4949

5050
If this is the first time you are requesting a [Management APIv2 Token](/api/management/v2/tokens), you will need to create and configure an application that can be used to call the Management API:
5151

52-
1. From the [registered Auth0 Management API](${manage_url}/#/apis/management/authorized-clients) in the [Dashboard], click the **API Explorer** tab.
52+
1. From the [registered Auth0 Management API](${manage_url}/#/apis/management/authorized-clients) in the [Dashboard](${manage_url}), click the **API Explorer** tab.
5353

5454
2. Click **Create & Authorize a Test Application**.
5555

articles/connections/database/custom-db/index.md

-1
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,5 @@ Whatever the use case, Auth0 extensibility allows you to tailor IdAM operations
3737
'connections/database/custom-db/overview-custom-db-connections',
3838
'connections/database/custom-db/create-db-connection',
3939
'connections/database/custom-db/templates',
40-
'best-practices/custom-db-connections',
4140
'connections/database/custom-db/error-handling'
4241
] }) %>

articles/integrations/azure-api-management/configure-auth0.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Once Auth0 has created your Connection, you'll be redirected to your Connection'
7070

7171
Finally, we'll create a user that we use later on to test the integration.
7272

73-
Go to the [Users section]((${manage_url}/#/users)) of the Management Dashboard. Click **Create User**.
73+
Go to the [Users section](${manage_url}/#/users) of the Management Dashboard. Click **Create User**.
7474

7575
![](/media/articles/integrations/azure-api-mgmt/auth0/user.png)
7676

articles/libraries/lock/v11/index.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Make sure you read about the [limitations of cross-origin authentication](/cross
7777

7878
### 1. Initializing Lock
7979

80-
First, you'll need to initialize a new `Auth0Lock` object, and provide it with your Auth0 client ID (the unique client ID for each Auth0 application, which you can get from the [management dashboard](${manage_url})) and your Auth0 domain (for example `yourname.auth0.com`).
80+
First, you'll need to initialize a new `Auth0Lock` object, and provide it with your Auth0 client ID (the unique client ID for each Auth0 application, which you can get from the [management dashboard](${manage_url})) and your Auth0 domain (for example, `yourname.auth0.com`).
8181

8282
```js
8383
// Initializing our Auth0Lock

articles/users/search/v2/query-syntax.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ You can search for users using the following fields:
3838
- `family_name`
3939

4040
::: warning
41-
New tenants, starting September 1st 2017, cannot search any of the `app_metadata` fields. Paid tenants (that is, tenants that have a credit card associated in the [Dashboard](${manage_url}/#/tenant/billing/payment)), that were created up to August 31st 2017, can search using the `app_metadata` fields.
41+
New tenants, starting September 1st 2017, cannot search any of the `app_metadata` fields. Paid tenants (that is, tenants that have a credit card associated in the [Dashboard](${manage_url}/#/tenant/billing/payment)) that were created up to August 31st 2017, can search using the `app_metadata` fields.
4242
Note that [Search v3](/users/search/v3/query-syntax) does not have this restriction.
4343
:::
4444
For more information, see the [Metadata Overview](/users/concepts/overview-user-metadata).

config/cards.yml

+16-16
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,17 @@
99
icon: "icon-budicon-499"
1010
color: "orange"
1111
description: "Learn the basics of using Auth0."
12-
url: "/getting-started"
12+
url: "/get-started"
1313
articles:
1414

1515
- title: "Create a Tenant"
16-
url: "/getting-started/create-tenant"
16+
url: "/get-started/learn-the-basics"
1717

1818
- title: "Set Up An App"
19-
url: "/getting-started/set-up-app"
19+
url: "/get-started/learn-the-basics"
2020

2121
- title: "Add Login"
22-
url: "/application-auth/current"
22+
url: "/authorization/authentication-and-authorization"
2323

2424
- id: "ui-components"
2525
title: "Login"
@@ -68,7 +68,7 @@
6868
url: "/authorization"
6969

7070
- title: "Role-based Access Control"
71-
url: "/authorization/concepts/rbac"
71+
url: "/authorization/rbac"
7272

7373
- title: "Authorization Extension"
7474
url: /extensions/authorization-extension
@@ -85,10 +85,10 @@
8585
url: "/users"
8686

8787
- title: "User Profiles"
88-
url: "/users/concepts/overview-user-profile"
88+
url: "/users/user-profiles"
8989

9090
- title: "Import & Export Users"
91-
url: "/users/concepts/overview-user-migration"
91+
url: "/users/import-and-export-users"
9292

9393
- id: "apis"
9494
title: "APIs"
@@ -99,7 +99,7 @@
9999
articles:
100100

101101
- title: "API Overview"
102-
url: "/api/info"
102+
url: "/api"
103103

104104
- title: "Authentication API"
105105
url: "/api/authentication"
@@ -119,13 +119,13 @@
119119
articles:
120120

121121
- title: "Introduction to Identity"
122-
url: "/videos/learn-identity/01-introduction-to-identity"
122+
url: "/videos/learn-identity-series/learn-identity-series/introduction-to-identity"
123123

124124
- title: "OpenID Connect and OAuth2"
125-
url: "/videos/learn-identity/02-oidc-and-oauth"
125+
url: "/videos/learn-identity-series/openid-connect-and-oauth2"
126126

127127
- title: "Web Sign-In"
128-
url: "/videos/learn-identity/03-web-sign-in"
128+
url: "/videos/learn-identity-series/web-sign-in"
129129

130130
- id: "extensibility"
131131
title: "Extensibility"
@@ -136,7 +136,7 @@
136136
articles:
137137

138138
- title: "Rules"
139-
url: "/rules/current"
139+
url: "/rules"
140140

141141
- title: "Extensions"
142142
url: "/extensions"
@@ -149,14 +149,14 @@
149149
icon: "icon-budicon-399"
150150
color: "green"
151151
description: "Guides and tutorials on working with Auth0."
152-
url: "/topics/guides"
152+
url: "/architecture-scenarios"
153153
articles:
154154

155-
- title: "Architecture Scenarios"
156-
url: /architecture-scenarios
155+
- title: "Private Cloud"
156+
url: "/private-cloud"
157157

158158
- title: "Monitoring"
159-
url: "/monitoring"
159+
url: "/monitor-auth0"
160160

161161
- title: "Deployments"
162162
url: "/deploy"

config/included-folders.yml

+9
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
- /articles/architecture-scenarios
2+
- /articles/api/authentication
3+
- /articles/api/authorization-extension
4+
- /articles/connections
5+
- /articles/microsites
6+
- /articles/quickstart
7+
- /articles/_includes
8+
- /snippets
9+
- /updates

0 commit comments

Comments
 (0)