From f2a41d0eeca66f8b1fe28f32dd02c8dd2251c555 Mon Sep 17 00:00:00 2001 From: Esha Noronha Date: Fri, 24 Jan 2025 09:59:30 +0100 Subject: [PATCH 1/2] Added introduction --- umbraco-cloud/set-up/external-login-providers.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/umbraco-cloud/set-up/external-login-providers.md b/umbraco-cloud/set-up/external-login-providers.md index 31e7d56756a..198f98aafc7 100644 --- a/umbraco-cloud/set-up/external-login-providers.md +++ b/umbraco-cloud/set-up/external-login-providers.md @@ -8,6 +8,16 @@ noIndex: true # External Login Providers +The External Login Providers feature in Umbraco Cloud allows you to integrate third-party authentication systems to manage backoffice user logins securely and efficiently. This functionality is especially useful for teams that want to simplify login management or use their existing identity systems. + +Using OpenID Connect, Umbraco Cloud supports external login providers such as Microsoft Entra ID, Auth0, Google, and so on. This feature helps administrators manage backoffice access, assign user roles, and improve security. + +This guide shows you how to set up and configure external login providers for your Cloud projects, including how to: + +* [Prepare your login provider](#prepare-your-login-provider) +* [Register the login provider on Umbraco Cloud](#register-the-login-provider-on-umbraco-cloud) +* [How to fill in the External Login Provider configuration](#how-to-fill-in-the-external-login-provider-configuration) + {% hint style="info" %} This feature is currently only available for backoffice logins. {% endhint %} From 6450850cdbcf34619fe4b9263651ea195d2a51a4 Mon Sep 17 00:00:00 2001 From: Esha Noronha Date: Fri, 24 Jan 2025 13:00:02 +0100 Subject: [PATCH 2/2] Incoporated review comments --- umbraco-cloud/set-up/external-login-providers.md | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/umbraco-cloud/set-up/external-login-providers.md b/umbraco-cloud/set-up/external-login-providers.md index 198f98aafc7..1af18abdd99 100644 --- a/umbraco-cloud/set-up/external-login-providers.md +++ b/umbraco-cloud/set-up/external-login-providers.md @@ -10,17 +10,19 @@ noIndex: true The External Login Providers feature in Umbraco Cloud allows you to integrate third-party authentication systems to manage backoffice user logins securely and efficiently. This functionality is especially useful for teams that want to simplify login management or use their existing identity systems. +{% hint style="info" %} +This feature is currently only available for backoffice logins. +{% endhint %} + Using OpenID Connect, Umbraco Cloud supports external login providers such as Microsoft Entra ID, Auth0, Google, and so on. This feature helps administrators manage backoffice access, assign user roles, and improve security. -This guide shows you how to set up and configure external login providers for your Cloud projects, including how to: +This guide shows you how to set up and configure external login providers for your Cloud projects. It includes the following steps: * [Prepare your login provider](#prepare-your-login-provider) * [Register the login provider on Umbraco Cloud](#register-the-login-provider-on-umbraco-cloud) -* [How to fill in the External Login Provider configuration](#how-to-fill-in-the-external-login-provider-configuration) -{% hint style="info" %} -This feature is currently only available for backoffice logins. -{% endhint %} +Additionally, you can explore a few examples in the section below: +* [Configuration scenarios](#configuration-scenarios)
@@ -185,7 +187,7 @@ The **alias** must be unique across different login providers in the same enviro {% endtab %} {% endtabs %} -## How to fill in the External Login Provider configuration +## Configuration Fields Learn about what type of data and information you need for each field in the configuration form. @@ -226,4 +228,3 @@ Any user authenticated via the external login provider can have a role claim ass * Select **Unauthorized** in the **No User Group Found Behaviour** setting. * Fill in the **User Group Mappings** map. * Enable **Enforce User Group on login**. -