Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 8b5c9cf

Browse files
committed
fixed spacing
1 parent 04c267e commit 8b5c9cf

File tree

1 file changed

+12
-10
lines changed

1 file changed

+12
-10
lines changed

docs/programs/single-sign-on-sso-via-saml.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -96,27 +96,29 @@ When the primary certificate isn't used anymore, you can promote the alternative
9696

9797
### Changing Identity Providers
9898

99-
If you need to change your identity provider at any time, to provide a more seamless self-service configuration, you can follow these steps:
99+
If you need to change your identity provider at any time, to provide a more seamless self-service configuration, you can follow these steps:
100+
101+
1. Copy this information from your prior identity provider configuration:
100102

101-
1. Copy this information from your prior identity provider configuration:
102-
103103
Field | Details
104104
------ | ------
105105
Domain | The domain for users that was required to use SAML authentication.
106106
Single Sign On URL | The URL from your SAML provider to initiate a single sign-on attempt, sometimes called the login URL.
107107
X509 Certificate | The certificate from your SAML provider to verify the single sign-on response.
108-
109-
2. Preconfigure your new identity provider on your provider's site with information from HackerOne. Depending on your provider, you may need HackerOne's metadata endpoint and ACS URL. You can find that along with other helpful information [here](sso-faqs.html).
110-
* If you're using [Google](google-sso-saml-setup.html), [Okta](okta-sso-saml-setup.html), or [OneLogin](onelogin-sso-saml-setup.html), you can use the resources on our docs site for configuring those identity providers (more links are at the top of this page).
111-
108+
109+
2. Preconfigure your new identity provider on your provider's site with information from HackerOne. Depending on your provider, you may need HackerOne's metadata endpoint and ACS URL. You can find that along with other helpful information [here](sso-faqs.html).
110+
* If you're using [Google](google-sso-saml-setup.html), [Okta](okta-sso-saml-setup.html), or [OneLogin](onelogin-sso-saml-setup.html), you can use the resources on our docs site for configuring those identity providers (more links are at the top of this page).
111+
112112
3. Go to **Program Settings > General > Authentication** in HackerOne.
113+
113114
> **Note:** Steps 4 - 7 will make your SAML authentications temporarily unavailable. Be sure to communicate this to your program members as needed.
114-
4. Disable your current configuration by clicking **Yes, disable SAML**.
115+
116+
4. Disable your current configuration by clicking **Yes, disable SAML**.
115117
5. Uncheck the check box for **Send password reset emails to affected users."
116118
![SAML Disable modal](./images/saml-disable-modal.png)
117119
6. Re-configure your SAML configuration with the new identity provider information by following steps 1-12 [here](single-sign-on-sso-via-saml.html#set-up).
118120
7. Make sure the checkbox for *Notify existing users that SAML is enabled** is unchecked when the **Enable SAML** window pops up.
119-
8. Click **Enable**.
121+
8. Click **Enable**.
120122
![SAML Enable modal](./images/saml-enable-modal.png)
121-
123+
122124
If at anytime testing doesn't work or you encounter issues, revert to the recorded information for the prior identity provider.

0 commit comments

Comments
 (0)